Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.1.29

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks  

Sung Jaechul (University of Seoul)
Moon Dukjae (National Security Research Institute)
Im Hung-su (Korea University)
Chee Seongtaek (National Security Research Institute)
Lee Sangjin (Korea University)
Abstract
In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.
Keywords
Software-Oriented Stream ciphers; Algebraic attacks; HELIX; SCREAM; MUGI; PANAMA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Courtois, 'Fast Algebraic Attack on Stream Ciphers with Linear Feedback,' Advances in Cryptology - CRYPTO 2003, LNCS 2729, Springer-Verlag, pp. 176-194, 2003
2 N. Courtois and J. Pieprzyk, 'Cryptanalysis of Block Ciphers with Overdefined System of Equations,' Advances in Cryptology - ASIACRYPT 2002, LNCS 2501, Springer-Verlag, pp. 267-287, 2002
3 CRYPTREC Project, Cryptography Research Evaluation Committee, 2000-2002. Available at http://www.ipa.go.jp/security/enc/CRYPTREC
4 S. Furuya, D. Watanabe, and K. Takaragi, 'MULTI-S01 : An Integrity-Aware Block Encryption Based on Cryptographic Pseudorandom Number Generator,' Submitted at CRYPTREC Project, 2000
5 S. Halevi, D. Coppersmith, and C. Jutla, 'Scream : A Software-Efficinet Stream Cipher,' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 195-209, 2002
6 P. Rogaway and D. Coppersmith, 'A Software-Optimized Encryption Algo rithm,' The 1st Fast Software Encryption Workshop - FSE 1993, LNCS 809, Springer-Verlag, pp. 56-63, 1993
7 A. Kipnis and A. Shamir, 'Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization,' Advances in Cryptology - CRYPTO 1999, LNCS 1666, Springer-Verlag, pp. 19-30, 1999
8 N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno, 'Helix : Fast Encryption and Authentication in as Single Cryptographic Primitive,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 330-346, 2003
9 D. Watanabe, S. Furuya, H. Yoshida, K. Takaragi, and B. Preneel, 'A New Keystream Generatior MUGI,' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 179-194, 2002
10 C. Ding, V. Niemi, A. Renvall, and A. Salomaa, 'TWOPRIME : A Fast Stream Ciphering Algorithm' The 4th Fast Software Encryption Workshop - FSE 1997, LNCS 1372, Springer-Verlag, pp. 82-102, 1997
11 NESSIE Project, New European Schemes for Signatures, Integrity and Encryption, 2000-2002. Available at http://cryptonessie.org
12 K. Discoll, 'BEEPBEEP : Embedded Real-Time Encryption' The 9th Fast Software Encryption Workshop - FSE 2002, LNCS 2365, Springer-Verlag, pp. 164-178, 2002
13 J. Daemen and C. Clapp, 'Fast Hashing and Stream Cipher with PANAMA' The 5th Fast Software Encryption Workshop - FSE 1998, LNCS 1372, Springer-Verlag, pp. 60-74, 1998
14 N. Courtois and J. Patarin, 'About the XL Algorithm over GF(2),' Topics in Cryptology - CT-RSA 2003, LNCS 2612, Springer-Verlag, pp. 141-157, 2003
15 P. Ekdahl and T. Johansson, 'A New Version of the Stream Cipher SNOW' The 9th Annual International Workshop - SAC 2002, LNCS 2595, Springer-Verlag, pp. 47-61, 2002
16 R. Rivest, 'RC4,' Unpublished Work (A description of RC4 appears in B. Schneier, Applied Cryptography, 1996)
17 B. Zoltak, 'VMPC One-Way Function and Stream Cipher,' The 11th Fast Software Encryption Workshop - FSE 2004, LNCS 3017, Springer-Verlag, pp. 210-225, 2004
18 M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius, 'Rabbit : A New High-Performance Stream Cipher,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 307-327, 2003
19 N. Courtois, 'Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt,' The 5th International Conference on Information Security and Cryptography - ICISC 2002, LNCS 2587, Springer-Verlag, pp. 182-199, 2002
20 M. Zhang, C. Carroll, and A. Chan, 'The Software-Oriented Stream Cipher SSC2,' The 7th Fast Software Encryption Workshop - FSE 2000, LNCS 1978, Springer-Verlag, pp. 31-48, 2004
21 H. Wu, 'A New Stream Cipher HC-256,' The 11th Fast Software Encryption Workshop - FSE 2004, LNCS 3017, Springer-Verlag, pp. 226-244, 2004
22 F. Armknecht and M. Krause, 'Algebraic Attacks on Combiners with Memory,' Advances in Cryptology - CRYPTO 2003, LNCS 2729, Springer-Verlag, pp. 162-175, 2003
23 N. Courtois, W. Meier, 'Algebraic Attacks on Stream Ciphers with Linear Feedback,' Advances in Cryptology - EUROCRYPT 2003, LNCS 2656, Springer-Verlag, pp. 345-359, 2003
24 P. Rogaway and D. Coppersmith, 'A Software-Optimized Encryption Algorithm,' Journal of Cryptology, Vol. 11, No. 4, pp. 274-287, 1998
25 N. Courtois, 'The Security of Hidden Field Equations,' Topics in Cryptology - CT-RSA 2001, LNCS 2020, Springer-Verlag, pp. 266-281, 2001
26 P. Hawkes and G. G. Rose, 'Primitive Specification and Supporting Documentation for SOBER-t32 Submission to NESSIE,' Proceedings of the First Open NESSIE Workshop, 2000
27 G. G. Rose and P. Hawkes, 'Turing : A Fast Stream Cipher,' The 10th Fast Software Encryption Workshop - FSE 2003, LNCS 2887, Springer-Verlag, pp. 290-306, 2003