Abstract
This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 252 words of known key stream and has a time complexity of about 275.
Chapter PDF
References
Eli Biham. A fast new DES implementation in software. In Eli Biham, editor, Fast Software Encryption’ 97, pages 260–272. Springer Verlag, 1997.
J. Kelsey, B. Schneier, and D. Wagner. Mod n cryptanalysis with applications against RC5P and M6. In L. Knudsen, editor, Fast Software Encryption’ 99, volume 1636 of Lecture Notes in Computer Science, pages 139–155. Springer Verlag, 1999.
P. Hawkes, F. Quick and G. Rose. A practical cryptanalysis of SSC2. In S. Vaudenay and A.M. Youssef, editor, Selected Areas in Cryptography’ 01, volume 2259 of Lecture Notes in Computer Science, pages 27–37, Springer Verlag, 2001.
O. Staffelbach and W. Meier. Cryptographic significance of the carry for ciphers based on integer addition. In A.J. Menezes and S. A. Vanstone, editors, Advances in Cryptology — CRYPTO’ 90, volume 537 of Lecture Notes in Computer Science, pages 601–615. Springer Verlag, 1991.
Muxiang Zhang, Christopher Carroll, and Agnes Chan. The software-oriented stream cipher SSC2. In Fast Software Encryption’ 2000 (preproceedings), 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bleichenbacher, D., Meier, W. (2002). Analysis of SSC2. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_19
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive