Skip to main content

Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher

  • Conference paper
  • First Online:
Sequences and Their Applications - SETA 2014 (SETA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8865))

Included in the following conference series:

  • 724 Accesses

Abstract

The Common Scrambling Algorithm Stream Cipher (CSA-SC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L., Wong, K.K.: Slide attacks on the sfinks stream cipher. In: 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS), December 2012, pp. 1–10 (2012)

    Google Scholar 

  2. Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L., Wong, K.K.: Slid pairs in the initialisation of the A5/1 stream cipher. In: Thomborson, C., Parampalli, U. (eds.) Information Security 2013 (AISC 2013). CRPIT, vol. 138, pp. 3–12. ACS, Adelaide (2013)

    Google Scholar 

  3. Bewick, S.: Descrambling DVB data according to ETSI common scrambling specification, UK Patent GB2322994A, September 1998

    Google Scholar 

  4. Bewick, S.: Descrambling DVB data according to ETSI common scrambling standard, UK Patent GB2322995A, September 1998

    Google Scholar 

  5. Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Goos, G., Hartmanis, J., van Leeuwin, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 1–18. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  8. Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Braeken, A., Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: SFINKS: a synchronous stream cipher for restricted hardware environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/026 (2005). www.ecrypt.eu.org/stream/ciphers/sfinks/sfinks.ps

  10. Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5/1 (1999). http://cryptome.org/jya/a51-pi.htm

  11. De Cannière, C., Küçük, Ö., Preneel, B.: Analysis of Grain’s initialization algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276–289. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. European Standards Organization - European Union. European Telecommunications Standards Institute. http://www.etsi.org/

  13. Golić, J.: Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Inf. Theor. 46(3), 1081–1090 (2000)

    Article  MATH  Google Scholar 

  14. Priemuth-Schmid, D., Biryukov, A.: Slid pairs in Salsa20 and Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 1–14. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Rose, G., Hawkes, P.: On the applicability of distinguishing attacks against stream ciphers. In: Proceedings of the 3rd NESSIE Workshop, p. 6. Citeseer (2002)

    Google Scholar 

  16. Simpson, L., Henricksen, M., Yap, W.-S.: Improved cryptanalysis of the common scrambling algorithm stream cipher. In: Boyd, C., González Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 108–121. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Tews, E., Wälde, J., Weiner, M.: Breaking DVB-CSA. In: Armknecht, F., Lucks, S. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 45–61. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  18. Weinmann, R., Wirt, K.: Analysis of the DVB common scrambling algorithm. In: Chadwick, D., Preneel, B. (eds.) Communications and Multimedia Security. IFIP - The International Federation for Information Processing, vol. 175, pp. 195–207. Springer, US (2005)

    Chapter  Google Scholar 

  19. Wu, H., Preneel, B.: Resynchronization attacks on WG and LEX. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 422–432. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Zhang, H., Wang, X.: Cryptanalysis of stream cipher grain family. Cryptology ePrint Archive, Report 2009/109 (2009). http://eprint.iacr.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harry Bartlett .

Editor information

Editors and Affiliations

A CSA-SC S-Boxes

A CSA-SC S-Boxes

Table 6. Input and output bits of the 14 Boolean functions
Table 7. The truth table of the 14 Boolean functions

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bartlett, H., Alhamdan, A., Simpson, L., Dawson, E., Wong, K.KH. (2014). Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. In: Schmidt, KU., Winterhof, A. (eds) Sequences and Their Applications - SETA 2014. SETA 2014. Lecture Notes in Computer Science(), vol 8865. Springer, Cham. https://doi.org/10.1007/978-3-319-12325-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12325-7_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12324-0

  • Online ISBN: 978-3-319-12325-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics