Browse > Article
http://dx.doi.org/10.3837/tiis.2016.04.027

Impossible Differential Cryptanalysis on DVB-CSA  

Zhang, Kai (Information Science and Technology Institute)
Guan, Jie (Information Science and Technology Institute)
Hu, Bin (Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.4, 2016 , pp. 1944-1956 More about this Journal
Abstract
The Digital Video Broadcasting-Common Scrambling Algorithm is an ETSI-designated algorithm designed for protecting MPEG-2 signal streams, and it is universally used. Its structure is a typical hybrid symmetric cipher which contains stream part and block part within a symmetric cipher, although the entropy is 64 bits, there haven't any effective cryptanalytic results up to now. This paper studies the security level of CSA against impossible differential cryptanalysis, a 20-round impossible differential for the block cipher part is proposed and a flaw in the cipher structure is revealed. When we attack the block cipher part alone, to recover 16 bits of the initial key, the data complexity of the attack is O(244.5), computational complexity is O(222.7) and memory complexity is O(210.5) when we attack CSA-BC reduced to 21 rounds. According to the structure flaw, an attack on CSA with block cipher part reduced to 21 rounds is proposed, the computational complexity is O(221.7), data complexity is O(243.5) and memory complexity is O(210.5), we can recover 8 bits of the key accordingly. Taking both the block cipher part and stream cipher part of CSA into consideration, it is currently the best result on CSA which is accessible as far as we know.
Keywords
Hybrid Symmetric Cipher; Impossible Differential Cryptanalysis; DVB-CSA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R.P. Weinmann and K. Wirt, "Analysis of the DVB Common Scrambling Algorithm," in Proc. of IFIP International Federation for Information Processing 2005, Volume 175/2005, pp.195-207, 2005. Article (CrossRef Link).
2 K. Wirt, "Fault attack on the DVB Common Scrambling Algorithm," in Proc. of Computational science and its applications-ICCSA 2005, Volume 3481, pp.511-517, 2005. Article (CrossRef Link).
3 L. Simpson, M. Henricksen and W.S. Yap, "Improved Cryptanalysis of the Common Scambling Algorithm Stream Cipher," in Proc. of the 14th Australasian Conference on Information Security and Privacy 2009, pp.108-121, 2009. Article (CrossRef Link).
4 E. Tews, J. Walde and M. Weiner, "Breaking DVB-CSA," in Proc. of West European Workshop on Research in Cryptography 2011, pp.41-45, 2011. Article (CrossRef Link).
5 L.R. Knudsen, "DEAL-A 128-bit Block Cipher," Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb. 1998. Article (CrossRef Link).
6 E. Biham, A. Biryukov, "A. Shamir. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials," in Proc. of Eurocrypt'99. Berlin: Springer-Verlag, LNCS, 1999. 1592: pp. 12-23, 1999. Article (CrossRef Link).
7 E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology, Vol 3, pp. 3-72, 1991. Article (CrossRef Link)   DOI
8 E. Biham and N. Keller, "Cryptanalysis of Reduced Variants of Rijndael," 3rd AES Conference, 2000. Article (CrossRef Link)
9 W. Zhang, W. Wu, L. Zhang, D. Feng, "Improved related-key impossible differential attacks on reduced-round AES-192," in Proc. of Selected Areas in Cryptography (SAC 2006), Montreal, Canada, Springer-Verlag, August 17-18, pp. 168-181, 2006. Article (CrossRef Link)
10 W. Wu, W. Zhang, D. Feng, “Impossible differential cryptanalysis of reduced-round ARIA and Camellia,” Journal of computer science and technology, 22(3): 449-456, 2007. Article (CrossRef Link)   DOI
11 W. Wu, L. Zhang, W. Zhang, "Improved Impossible Differential Cryptanalysis of Reduced- Round Camellia," in Proc. of Selected Areas in Cryptography (SAC 2008), Springer-Verlag, LNCS vol. 5381, pp. 442-456, 2009. Article (CrossRef Link)
12 J. Chen, K. Jia, H. Yu, X. Wang, "New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256," in Proc. of Information Security and Privacy, Springer-Verlag, LNCS vol. 6812, pp. 16-33, 2011. Article (CrossRef Link)
13 C. Du, J. Chen, "Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds," in Proc. of Cryptology and Network Security, LNCS vol. 6467, pp. 20-30, 2010. Article (CrossRef Link)
14 S. Li, C. Song, "Improved Impossible Differential Cryptanalysis of ARIA," in Proc. of Information Security and Assurance, ISA 2008, pp. 129-132, 2008. Article (CrossRef Link)
15 K. Zhang, J. Guan “Distinguishing Attack on Common Scrambling Algorithm,” The International Arab Journal of Information Technology, 12(4), 410-414, 2015.