A note on distinguishing attacks

Håkan Englund, Martin Hell, Thomas Johansson

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision attack, is presented. The attack can succeed if the part of the state that depends on both the key and the IV is smaller than twice the key size. It is shown that the attack is applicable to block ciphers in OFB mode. For OFB mode, the attack is more powerful than the previously known generic distinguishing attack since it will directly recover a part of the plaintext while having the same asymptotic complexity as the generic distinguishing attack. The attack is also demonstrated on the eSTREAM candidate LEX. LEX is not vulnerable to any of the previously known generic distinguishing attack but is vulnerable to the new attack. It is shown that if approximately 265.7 resynchronizations using LEX are performed for the same key, some plaintext might be recovered.
Original languageEnglish
Title of host publication[Host publication title missing]
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
Pages87-90
ISBN (Print)978-1-4244-1200-6
DOIs
Publication statusPublished - 2007
EventIEEE Information Theory Workshop on Information Theory for Wireless Networks - Bergen, Norway
Duration: 2007 Jul 12007 Jul 6

Conference

ConferenceIEEE Information Theory Workshop on Information Theory for Wireless Networks
Country/TerritoryNorway
CityBergen
Period2007/07/012007/07/06

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'A note on distinguishing attacks'. Together they form a unique fingerprint.

Cite this