Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks |
Sung Jaechul
(University of Seoul)
Moon Dukjae (National Security Research Institute) Im Hung-su (Korea University) Chee Seongtaek (National Security Research Institute) Lee Sangjin (Korea University) |
1 | N. Courtois, 'Fast Algebraic Attack on Stream Ciphers with Linear Feedback,' Advances in Cryptology - CRYPTO 2003, LNCS 2729, Springer-Verlag, pp. 176-194, 2003 |
2 | N. Courtois and J. Pieprzyk, 'Cryptanalysis of Block Ciphers with Overdefined System of Equations,' Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, Springer-Verlag, pp. 267-287, 2002 |
3 | CRYPTREC Project, Cryptography Research Evaluation Committee, 2000-2002. Available at http://www.ipa.go.jp/security/enc/CRYPTREC |
4 | S. Furuya, D. Watanabe, and K. Takaragi, 'MULTI-S01 : An Integrity-Aware Block Encryption Based on Cryptographic Pseudorandom Number Generator,' Submitted at CRYPTREC Project, 2000 |
5 | S. Halevi, D. Coppersmith, and C. Jutla, 'Scream : A Software-Efficinet Stream Cipher,' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 195-209, 2002 |
6 | P. Rogaway and D. Coppersmith, 'A Software-Optimized Encryption Algo rithm,' The 1st Fast Software Encryption Workshop - FSE 1993, LNCS 809, Springer-Verlag, pp. 56-63, 1993 |
7 | A. Kipnis and A. Shamir, 'Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization,' Advances in Cryptology - CRYPTO 1999, LNCS 1666, Springer-Verlag, pp. 19-30, 1999 |
8 | N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno, 'Helix : Fast Encryption and Authentication in as Single Cryptographic Primitive,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 330-346, 2003 |
9 | D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, and B. Preneel, 'A New Keystream Generatior MUGI,' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 179-194, 2002 |
10 | C. Ding, V. Niemi, A. Renvall, and A. Salomaa, 'TWOPRIME : A Fast Stream Ciphering Algorithm' The 4th Fast Software Encryption Workshop - FSE 1997, LNCS 1372, Springer-Verlag, pp. 82-102, 1997 |
11 | NESSIE Project, New European Schemes for Signatures, Integrity and Encryption, 2000-2002. Available at http://cryptonessie.org |
12 | K. Discoll, 'BEEPBEEP : Embedded Real-Time Encryption' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 164-178, 2002 |
13 | J. Daemen and C. Clapp, 'Fast Hashing and Stream Cipher with PANAMA' The 5th Fast Software Encryption Workshop - FSE 1998, LNCS 1372, Springer-Verlag, pp. 60-74, 1998 |
14 | N. Courtois and J. Patarin, 'About the XL Algorithm over GF(2),' Topics in Cryptology - CT-RSA 2003, LNCS 2612, Springer-Verlag, pp. 141-157, 2003 |
15 | P. Ekdahl and T. Johansson, 'A New Version of the Stream Cipher SNOW' The 9th Annual International Workshop - SAC 2002, LNCS 2595, Springer-Verlag, pp. 47-61, 2002 |
16 | R. Rivest, 'RC4,' Unpublished Work (A description of RC4 appears in B. Schneier, Applied Cryptography, 1996) |
17 | B. Zoltak, 'VMPC One-Way Function and Stream Cipher,' The 11th Fast Software Encryption Workshop - FSE 2004, LNCS 3017, Springer-Verlag, pp. 210-225, 2004 |
18 | M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius, 'Rabbit : A New High-Performance Stream Cipher,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 307-327, 2003 |
19 | N. Courtois, 'Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt,' The 5th International Conference on Information Security and Cryptography - ICISC 2002, LNCS 2587, Springer-Verlag, pp. 182-199, 2002 |
20 | M. Zhang, C. Carroll, and A. Chan, 'The Software-Oriented Stream Cipher SSC2,' The 7th Fast Software Encryption Workshop - FSE 2000, LNCS 1978, Springer-Verlag, pp. 31-48, 2004 |
21 | H. Wu, 'A New Stream Cipher HC-256,' The 11th Fast Software Encryption Workshop - FSE 2004, LNCS 3017, Springer-Verlag, pp. 226-244, 2004 |
22 | F. Armknecht and M. Krause, 'Algebraic Attacks on Combiners with Memory,' Advances in Cryptology - CRYPTO 2003, LNCS 2729, Springer-Verlag, pp. 162-175, 2003 |
23 | N. Courtois, W. Meier, 'Algebraic Attacks on Stream Ciphers with Linear Feedback,' Advances in Cryptology - EUROCRYPT 2003, LNCS 2656, Springer-Verlag, pp. 345-359, 2003 |
24 | P. Rogaway and D. Coppersmith, 'A Software-Optimized Encryption Algorithm,' Journal of Cryptology, Vol. 11, No. 4, pp. 274-287, 1998 |
25 | N. Courtois, 'The Security of Hidden Field Equations,' Topics in Cryptology - CT-RSA 2001, LNCS 2020, Springer-Verlag, pp. 266-281, 2001 |
26 | P. Hawkes and G. G. Rose, 'Primitive Specification and Supporting Documentation for SOBER-t32 Submission to NESSIE,' Proceedings of the First Open NESSIE Workshop, 2000 |
27 | G. G. Rose and P. Hawkes, 'Turing : A Fast Stream Cipher,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 290-306, 2003 |