Abstract
A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed with the plaintext. The patent does not discuss key management (generation, transmission) in sufficient detail. Some of the proposed methods for transmission of keys are highly insecure and an algorithm for key generation is missing. In this paper, we find that related-key attacks of negligibly low complexity (data/time) can result when certain (flawed) key generation algorithms are used. We also present a negligibly-low-complexity attack in a non-related-key setting. We hope that the results caution potential users of the cryptosystem.
This work was supported in part by the IAP Program P6/26 BCRYPT of the Belgian State (Belgian Science Policy), and in part by the European Commission through the ICT program under contract ICT-2007-216676 ECRYPT II.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anonymous, Thank you Bob Anderson, Cypherpunks mailing list (1994), http://web.archive.org/web/20080120083537/ , http://cypherpunks.venona.com/date/1994/09/msg00304.html
Artus, R.G.C.: Method and System for Encryption of Data. International Patent, publication number WO/2009/066313 (May 28, 2009), http://www.wipo.int/pctdb/en/wo.jsp?WO=2009066313
Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600–616. Springer, Heidelberg (2003)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5/2. In: rump session CRYPTO 1999 (1999)
Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 1–18. Springer, Heidelberg (2008)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Mantin, I.: RC4 (2002), http://www.wisdom.weizmann.ac.il/~itsik/RC4/rc4.html
Microchip Technology Inc., KeeLoq Authentication Products (2009), http://www.microchip.com/keeloq/
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Rivest, R.L.: Chaffing and Winnowing: Confidentiality without Encryption (April 1998), http://people.csail.mit.edu/rivest/Chaffing.txt
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons (1996)
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28-4, 656–715 (1949)
Wikipedia, KeeLoq (July 2010), http://en.wikipedia.org/wiki/KeeLoq
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sekar, G., Preneel, B. (2012). Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313. In: Jung, S., Yung, M. (eds) Information Security Applications. WISA 2011. Lecture Notes in Computer Science, vol 7115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27890-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27890-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27889-1
Online ISBN: 978-3-642-27890-7
eBook Packages: Computer ScienceComputer Science (R0)