Filters








9 Hits in 6.6 sec

Parametric Guess and Determine Attack on Stream Ciphers

Orhun Kara, Ebru Kucukkubas
2019 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)  
A new attack algorithm for internal state recovery and key recovery has been developed and mounted on Plantlet algorithm as an instance of stream ciphers with keyed update function.  ...  The state bits and key bits are successfully recovered. In the second phase, the attack algorithm was mounted on Fruit algorithm and state bits and key bits are also recovered successfully.  ...  Orhun Kara for his guidance and constant encouragement. I am very grateful to him for his scientic advice, knowledge, and many insightful discussions and suggestions.  ... 
doi:10.1109/pimrcw.2019.8880834 dblp:conf/pimrc/KaraK19 fatcat:mxupumco3fdzxpj36kztar4owe

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
Thus we briefly describe some well-known attacks on stream ciphers here due to the space limitation.  ...  Its representative instances are Sprout, Fruit, Plantlet stream ciphers, in which the key section at the top is fixed, while the NFSR and LFSR section are mutable.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

Fast Correlation Attacks on Grain-like Small State Stream Ciphers

Bin Zhang, Xinxin Gong, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation attacks, which are commonly regarded as classical cryptanalytic methods against LFSR-based stream ciphers  ...  Our attack requires 262.8 Fruit encryptions and 222.3 keystream bits to determine the 80-bit secret key. Practical simulations on a small-scale version confirmed our results.  ...  Acknowledgements We would like to thank the anonymous reviewers for very helpful comments.  ... 
doi:10.13154/tosc.v2017.i4.58-81 dblp:journals/tosc/ZhangGM17 fatcat:ltd3r64sxzetpeeyam5pyr45z4

Fast Correlation Attacks on Grain-like Small State Stream Ciphers

Bin Zhang, Xinxin Gong, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
In this paper, we study the security of Grain-like small state stream ciphers by fast correlation attacks, which are commonly regarded as classical cryptanalytic methods against LFSR-based stream ciphers  ...  Our attack requires 262.8 Fruit encryptions and 222.3 keystream bits to determine the 80-bit secret key. Practical simulations on a small-scale version confirmed our results.  ...  Acknowledgements We would like to thank the anonymous reviewers for very helpful comments.  ... 
doi:10.46586/tosc.v2017.i4.58-81 fatcat:3p3grv6acjgodf3bmetxuxzpfa

A New Lightweight Stream Cipher Based on Chaos

Lina Ding, Chunyuan Liu, Yanpeng Zhang, Qun Ding
2019 Symmetry  
Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is  ...  The chaotic system is quantified and integrated with two NFSRs based on the technology of Field Programmable Gate Array (FPGA).  ...  Acknowledgments: This work was supported by the Natural Science Foundation of China (No.61471158) and the Innovative Team of Heilongjiang Province (No.2012TD007).  ... 
doi:10.3390/sym11070853 fatcat:gw6filhqqzdptgx3fki2mqcnw4

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 1/2n, where n denotes the inner state length of the underlying keystream  ...  Lizard uses 120-bit keys, 64-bit IVs and has an inner state length of 121 bit. It is supposed to provide 80-bit security against key recovery attacks.  ...  of Lizard.  ... 
doi:10.13154/tosc.v2017.i1.45-79 dblp:journals/tosc/HamannKM17 fatcat:yy3mitkbqfftlbhxdbw7nupkzu

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 1/2n, where n denotes the inner state length of the underlying keystream  ...  Lizard uses 120-bit keys, 64-bit IVs and has an inner state length of 121 bit. It is supposed to provide 80-bit security against key recovery attacks.  ...  Moreover, we are grateful to anonymous reviewers and to Gregor Leander, whose comments helped improve the presentation of this paper.  ... 
doi:10.46586/tosc.v2017.i1.45-79 fatcat:aap4zegsgvfbhe5ly76inmpkrm

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives [chapter]

Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
2021 Security of Ubiquitous Computing Systems  
In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed in terms of security against tradeoff attacks  ...  It turns out that it is possible to design stream ciphers having much smaller internal states.  ...  if known, and we give the best known attacks in Table 2 Stream Ciphers Stream ciphers encrypt small portions of data (one or several bits) at a time.  ... 
doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m

A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices [article]

Mohammad Ebrahimabadi, Mohamed Younis, Naghmeh Karimi, Maryland Shared Open Access Repository
2021
We further study the implications of various parts of the challenge patterns on the modeling attack and propose extensions of our protocol that exploit bits scrambling and padding to ameliorate the attack  ...  The experimental results extracted from a 16-bit and a 64-bit arbiter-PUF implemented on FPGA demonstrate the effectiveness of the proposed methods in boosting the robustness of IoT authentication.  ...  Finally, a recent study has reported the execution time of popular lightweight LFSR-based stream ciphers for IoT, such as Lizard, Fruit, Plantlet, and Espresso [80] ; the latter is developed for 5G systems  ... 
doi:10.13016/m2jaxb-tcqn fatcat:4zoi25isknej7kd46e2bptocye