Li Shun-Bo
School of Science, Xi`an University of Architecture and Technology, Xi`an, 710055, Shaanxi, China
Wang Yan
School of Science, Xi`an University of Architecture and Technology, Xi`an, 710055, Shaanxi, China
Peng Jia-Long
School of Science, Xi`an University of Architecture and Technology, Xi`an, 710055, Shaanxi, China
ABSTRACT
Stream cipher Achterbahn-v2 is one of 34 candidates submitted to the eSTREAM project which is based on several nonlinear feedback shift registers (NLFSRs) and a nonlinear filter function. By finding the better parity check equations, an improved distinguishing attack on Achterbahn-v2 is proposed. Achterbahn-v2 can be distinguishable from truly random cipher by about O(2516) keystream bits. Moreover, this method reduces the data complexity of Plasencia's results by a factor of about 0.77.
PDF References Citation
How to cite this article
Li Shun-Bo, Wang Yan and Peng Jia-Long, 2013. Improved Distinguishers on Stream Cipher Achterbahn-v2. Information Technology Journal, 12: 8005-8009.
DOI: 10.3923/itj.2013.8005.8009
URL: https://scialert.net/abstract/?doi=itj.2013.8005.8009
DOI: 10.3923/itj.2013.8005.8009
URL: https://scialert.net/abstract/?doi=itj.2013.8005.8009
REFERENCES
- Bhateja, A. and M. Din, 2013. ANN based distinguishing attack on RC4 stream cipher. Proceedings of the 7th International Conference on Bio-Inspired Computing: Theories and Applications, Volume 2, December 14-16, 2012, Indian Institute of Information Technology and Management, Gwalior, India, pp: 101-109.
CrossRef - Canteaut, A. and M. Naya-Plasencia, 2012. Parity-check relations on combination generators. IEEE Trans. Inform. Theory, 58: 3900-3911.
CrossRef - Coppersmith, D., S. Halevi and C. Jutla, 2002. Cryptanalysis of stream ciphers with linear masking. Proceedings of the 22nd 22nd Annual International Cryptology Conference on Advances in Cryptology-Crypto, August 18-22, 2002, California, USA., pp: 515-532.
CrossRef - Hell, M., T. Johansson, L. Brynielsson and H. Englund, 2012. Improved distinguishers on stream ciphers with certain weak feedback polynomials. IEEE Trans. Inform. Theory, 58: 6183-6193.
CrossRef - Hell, M. and T. Johansson, 2007. Cryptanalysis of Achterbahn-version 2. Proceedings of the 13th International Workshop on Selected Areas in Cryptography, August 17-18, 2006, Montreal, Canada, pp: 45-55.
CrossRef - Huang, X.L. and C.K. Wu, 2007. Cryptanalysis of achterbahn-version 1 and version 2. J. Comput. Sci. Technol., 22: 469-475.
CrossRef - Johansson, T., W. Meie and F. Muller, 2006. Cryptanalysis of achterbahn. Proceedings of the 13th International Workshop on Fast Software Encryption, March 15-17, 2006, Graz, Austria, pp: 1-14.
CrossRef - Orumiehchiha, M.A., J. Pieprzyk, E. Shakour and R. Steinfeld, 2013. Security evaluation of Rakaposhi stream cipher. Proceedings of the 9th International Conference on Information Security Practice and Experience, May 12-14, 2013, Lanzhou, China, pp: 361-371.
CrossRef - Orumiehchiha, M.A., J. Pieprzyk and R. Steinfeld, 2012. Cryptanalysis of WG-7: A lightweight stream cipher. Cryptography Commun., 4: 277-285.
CrossRef - Naya-Plasencia, M., 2007. Cryptanalysis of achterbahn-128/80. Proceedings of the 14th International Workshop on Fast Software Encryption, March 26-28, 2007, Luxembourg, Luxembourg, pp: 73-86.
CrossRef - Stankovski, P., S. Ruj, M. Hell and T. Johansson, 2012. Improved distinguishers for HC-128. Des. Codes Cryptography, 63: 225-240.
CrossRef - Shi, Z., B. Zhang and D. Feng, 2013. Cryptanalysis of helix and phelix revisited. Proceedings of the 18th Australasian Conference on Information Security and Privacy, July 1-3, 2013, Brisbane, Australia, pp: 27-40.
CrossRef