Advertisement

Experimental Statistical Attacks on Block and Stream Ciphers

  • S. Doroshenko
  • A. Fionov
  • A. Lubkin
  • V. Monarev
  • B. Ryabko
  • Yu. I. Shokin
Part of the Notes on Numerical Fluid Mechanics and Multidisciplinary Design book series (NNFM, volume 101)

Abstract

Efficient statistical tests, e.g. recently suggested “Book Stack” test, are successfully applied to detect deviations from randomness in bit sequences generated by stream ciphers such as RC4 and ZK-Crypt, as well as by block cipher RC6 (with reduced number of rounds). In case of RC6 a key recovery attack is also mounted. The essence of the tests is briefly described. The experiments data are provided.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rukhin, A., et al (ed.): A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 (rev. May 15, 2001)Google Scholar
  2. 2.
    Ryabko, B., Pestunov, A.: Probl. Inform. Transm. 40(1), 66–71 (2004)Google Scholar
  3. 3.
    Ryabko, B., Fionov, A.: Basics of contemporary cryptography for IT practitioners. World Scientific Publishing Co, Singapore (2006)Google Scholar
  4. 4.
    Dawson, E., Gustafson, H., Henricksen, M., Millan, B.: Evaluation of RC4 stream cipher (2002), http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/
  5. 5.
    Golic, J.D.: Iterative probabilistic cryptanalysis of RC4 keystream generator. In: Australasian Conf. on Information Security and Privacy (ACISP), pp. 220–233 (2000)Google Scholar
  6. 6.
    Fluhrer, S., McGrew, D.: Statistical analysis of the alleged RC4 keystream generator source in Lecture Notes In Computer Science. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Pudovkina, M.: Statistical weaknesses in the alleged RC4 keystream generator. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/171
  8. 8.
    Crowley, P.: Small bias in RC4 experimentally verified (2003), http://www.ciphergoth.org/crypto/rc4/
  9. 9.
    Gressel, C., Granot, R., Vago, G.: ZK-Crypt eSTREAM, ECRYPT Stream Cipher Project (2005), http://www.ecrypt.eu.org/stream/zkcrypt.html
  10. 10.
    Knudsen, L., Meier, W.: Correlations in RC6 whith a reduced number of rounds. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 94–108. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Miyaji, A., Nonaka, M.: Evaluation of the security of RC6 against the χ 2-attack. IEICE Trans Fundamentals E88-A(1) (2005)Google Scholar
  12. 12.
    Isogai, N., Matsunaka, T., Miyaji, A.: Optimized χ 2-attack aginst RC6. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 199–211. Springer, Heidelberg (2003)Google Scholar
  13. 13.
    Ryabko, B., Monarev, V., Shokin, Yu.: Probl. Inform. Transm. 41(4), 385–394 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • S. Doroshenko
    • 1
  • A. Fionov
    • 1
  • A. Lubkin
    • 1
  • V. Monarev
    • 2
  • B. Ryabko
    • 2
  • Yu. I. Shokin
    • 2
  1. 1.Siberian State University of Telecommunications and Computer ScienceNovosibirskRussia
  2. 2.Institute of Computational Technologies SB RASNovosibirskRussia

Personalised recommendations