Abstract
The Common Scrambling Algorithm Stream Cipher (CSA-SC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L., Wong, K.K.: Slide attacks on the sfinks stream cipher. In: 2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS), December 2012, pp. 1–10 (2012)
Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L., Wong, K.K.: Slid pairs in the initialisation of the A5/1 stream cipher. In: Thomborson, C., Parampalli, U. (eds.) Information Security 2013 (AISC 2013). CRPIT, vol. 138, pp. 3–12. ACS, Adelaide (2013)
Bewick, S.: Descrambling DVB data according to ETSI common scrambling specification, UK Patent GB2322994A, September 1998
Bewick, S.: Descrambling DVB data according to ETSI common scrambling standard, UK Patent GB2322995A, September 1998
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Goos, G., Hartmanis, J., van Leeuwin, J., Schneier, B. (eds.) FSE 2000. LNCS, vol. 1978, pp. 1–18. Springer, Heidelberg (2001)
Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)
Biryukov, A., Wagner, D.: Advanced slide attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)
Braeken, A., Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: SFINKS: a synchronous stream cipher for restricted hardware environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/026 (2005). www.ecrypt.eu.org/stream/ciphers/sfinks/sfinks.ps
Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of A5/1 (1999). http://cryptome.org/jya/a51-pi.htm
De Cannière, C., Küçük, Ö., Preneel, B.: Analysis of Grain’s initialization algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276–289. Springer, Heidelberg (2008)
European Standards Organization - European Union. European Telecommunications Standards Institute. http://www.etsi.org/
Golić, J.: Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Inf. Theor. 46(3), 1081–1090 (2000)
Priemuth-Schmid, D., Biryukov, A.: Slid pairs in Salsa20 and Trivium. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 1–14. Springer, Heidelberg (2008)
Rose, G., Hawkes, P.: On the applicability of distinguishing attacks against stream ciphers. In: Proceedings of the 3rd NESSIE Workshop, p. 6. Citeseer (2002)
Simpson, L., Henricksen, M., Yap, W.-S.: Improved cryptanalysis of the common scrambling algorithm stream cipher. In: Boyd, C., González Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 108–121. Springer, Heidelberg (2009)
Tews, E., Wälde, J., Weiner, M.: Breaking DVB-CSA. In: Armknecht, F., Lucks, S. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 45–61. Springer, Heidelberg (2012)
Weinmann, R., Wirt, K.: Analysis of the DVB common scrambling algorithm. In: Chadwick, D., Preneel, B. (eds.) Communications and Multimedia Security. IFIP - The International Federation for Information Processing, vol. 175, pp. 195–207. Springer, US (2005)
Wu, H., Preneel, B.: Resynchronization attacks on WG and LEX. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 422–432. Springer, Heidelberg (2006)
Zhang, H., Wang, X.: Cryptanalysis of stream cipher grain family. Cryptology ePrint Archive, Report 2009/109 (2009). http://eprint.iacr.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A CSA-SC S-Boxes
A CSA-SC S-Boxes
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bartlett, H., Alhamdan, A., Simpson, L., Dawson, E., Wong, K.KH. (2014). Weaknesses in the Initialisation Process of the Common Scrambling Algorithm Stream Cipher. In: Schmidt, KU., Winterhof, A. (eds) Sequences and Their Applications - SETA 2014. SETA 2014. Lecture Notes in Computer Science(), vol 8865. Springer, Cham. https://doi.org/10.1007/978-3-319-12325-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-12325-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12324-0
Online ISBN: 978-3-319-12325-7
eBook Packages: Computer ScienceComputer Science (R0)