Sufficient condition for SNOW-2.0-like stream ciphers’ to be secure against some related key attacks
DOI:
https://doi.org/10.18372/2410-7840.18.11087Keywords:
stream cipher, Even-Mansour scheme, shifting equivalet keys, related key attacks, provable security, SNOW 2.0Abstract
A class of stream ciphers similar to the well-known SNOW 2.0 cipher is investigated. The formal description of the ciphers from this class is given and the relation between keysream-generation process of a SNOW 2.0-like cipher and the message encryption with Even-Mansour scheme is determined. The security of SNOW-2.0-like stream ciphers against attacks based on the existence of shifting equivalent keys is analyzed. These attacks are related key attacks and can be applied to many stream ciphers, particularly, to SNOW 2.0. The main result of this paper is a sufficient condition for SNOW 2.0-like ciphers to be secure againt mentioned attacks. This condition is convenient for prac-tical appliances and allows constructing the affine mappings (that proceed keys and initialization vectors inserting into the keystream generator) guarantee the security of corresponding ciphers against mentioned attacks. The two examples of such mappings that can be used for constructing of new SNOW 2.0-like ciphers are proposed.References
Berbain C. Understanding phase shifting equivalent keys and exhaustive search /C. Berbain, A. Gouget, H. Sibert // http://eprint.iacr.org/2008/169.
Dunkelman O. Minimalism in cryptography: the Even-Mansour scheme revisited / O. Dunkelman, N. Keller, A. Shamir // http://eprint.iacr.org/ 2011/541.
Ekdahl P. A new version of the stream cipher SNOW /P. Ekdahl, T. Johansson // Selected Areas in Cryp-tography – SAC 2002. – LNCS 2295. – Springer-Ver-lag. – P. 47 – 61.
Even Sh. A construction of a cipher from a single pseudorandom permutation / Sh. Even, Y. Mansour // J. of Cryptology. – 1997. – Vol. 10. – № 3. – P. 159 – 162.
Kircanski A. On the sliding property of SNOW 3G and SNOW 2.0 / A. Kircansk, A. Youssef // IET In-formation Security. – 2011. – Vol. 5. – № 4. – P. 199 – 206.
ISO/IEC 18033-4: 2011(E). Information technology – Security techniques – Encryption algorithm – Part 4: Stream ciphers, 2011. – 92 p.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).