The differential cryptanalysis and design of natural stream ciphers

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 809)


This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic transformation densities are introduced, and their relations with other cryptographic factors are summarized. This work is illustrated by reference to the design and security of additive natural stream ciphers, which are nonlinear filtered sequences driven by a counter rather than by a shift register.


Linear Complexity Block Cipher Stream Cipher Differential Attack Differential Cryptanalysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    R. J. Anderson. Solving a class of stream ciphers, Cryptologia 14, no. 3, 1990, pp. 285–288.Google Scholar
  2. [2]
    R. J. Anderson. Fast Attack on Certain Stream Ciphers, Electronics Letters, 22nd July 1993, Vol. 29, No. 15, pp. 1322–1323.Google Scholar
  3. [3]
    R. J. Anderson. Derived sequence attacks on stream ciphers, presented at the Rump Session of Crypto'93.Google Scholar
  4. [4]
    L. D. Baumert. Cyclic Difference Sets, Lecture Notes on Mathematics, Vol. 182, Springer-Verlag, 1971.Google Scholar
  5. [5]
    H. Beker, F. Piper. Cipher Systems: The Protection of Communications, Northwood Books, London, 1982.Google Scholar
  6. [6]
    D. Coppersmith, H. Krawczyk, Y. Mansour. The Shrinking Generator, Preproceedings of Crypto'93.Google Scholar
  7. [7]
    E. Biham, A. Shamir. Differential cryptanalysis of DES-like crypto systems, Advances in Cryptology, Proc. of Crypto '90, LNCS, Springer-Verlag, 1990.Google Scholar
  8. [8]
    E. Biham. On the applicability of differential cryptanalysis to hash functions, E.I.S.S. Workshop on Cryptographic Hash Functions, Oberwolfach (D), March 25–27, 1992.Google Scholar
  9. [9]
    L. Blum, M. Blum, M. Shub. A simple unpredictable pseudorandom number operator, SIAM J. Comput. 15, pp. 364–383.Google Scholar
  10. [10]
    J. O. Brüer. On pseudorandom sequences as crypto generators, Proc. of Int. Zürich Sem. on Digital Communic, Zürich, Swithland, 1984.Google Scholar
  11. [11]
    W. Diffie, M. Hellman. Privacy and authentication: An introduction to cryptography, Proc. IEEE, vol. 67(3), Mar. 1979, pp. 397–427.Google Scholar
  12. [12]
    C. Ding, G. Xiao, W. Shan. The Stability Theory of Stream Ciphers. LNCS, vol. 561, Springer-Verlag, 1991.Google Scholar
  13. [13]
    P. R. Geffe. How to protect data with ciphers that are really hard to break, Electronics, Jan. 4, 1973.Google Scholar
  14. [14]
    J. Golič, M. Mihaljevič. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance, J. Cryptology, Vol. 3(3), pp. 201–212, 1991.Google Scholar
  15. [15]
    D. Gollmann, W. G. Chambers. A Cryptanalysis of Step k,m-Cascadeds, Proc. Eurocrypt'89, J. Quisquater, J. Vandewalle (eds.), Springer-Verlag, LNCS 434, pp. 680–687, 1990.Google Scholar
  16. [16]
    D. Gollmann, W. G. Chambers, clock-controlled shift registers: A review, IEEE J. on Selected Areas in Communications, vol. 7, no. 4, May 1989, pp. 525–533.Google Scholar
  17. [17]
    S. M. Jennings. Multiplexed sequences: Some properties of the minimal polynomial, LNCS, vol. 149, Springer-Verlag; 1983, pp. 189–206.Google Scholar
  18. [18]
    E. L. Key. An analysis of the structure and complexity of nonlinear binary sequences generators, IEEE Trans. Inform. Theory, vol. IT-22, no. 6, Nov. 1976, pp. 732–763.Google Scholar
  19. [19]
    A. Klapper, M. Goresky. 2-adic shift registers, Proc. of the 1993 Cambridge Algorithm Workshop, December 9–11 1993 (this volume)Google Scholar
  20. [20]
    J. L. Massey, I. Ingemarsson. The Rip van Winkel Cipher: A simple and provably computationally secure cipher with a finite key, in IEEE Int. Symp. on Inform. Theory, (Brighton, England), Abstr. June 24–28, 1985, pp. 146.Google Scholar
  21. [21]
    U. Maurer. A provably-secure strongly randomized cipher, in Advances in Cryptology, Eurocrypt'90, I. Damgård, Ed., LNCS, vol. 473, Springer-Verlag, 1991, pp. 361–373.Google Scholar
  22. [22]
    W. Meier, O. Staffelbach. Fast correlation attacks on certain stream ciphers, J. Cryptology, Vol. 1(3), pp. 159–176, 1989.Google Scholar
  23. [23]
    R. Mennicocci. Cryptanalysis of a two-stage Gollmann cascade generator, Proc. of SPRC'93, W. Wolfowicz (ed.), pp. 62–69, 1993.Google Scholar
  24. [24]
    K. Nyberg, L. R. Knudsen. Provable security against differential cryptanalysis, Advances in Cryptology: Eurocrypt'92.Google Scholar
  25. [25]
    V. S. Pless. Encryption schemes for computer confidentiallity, IEEE Trans. Cornput., vol. C-26, Nov. 1977, pp. 756–763.Google Scholar
  26. [26]
    B. Preneel, R. Govaerts, J. Vandewalle. Differential Cryptanalysis of Hash Functions Based on Block Ciphers, Proc. of the 1st ACM Conference on Computer & Communications Security, Fairfax VA, Nov 1993, published by the ACM pp. 183–188.Google Scholar
  27. [27]
    R. A. Rueppel. Design and Analysis of Stream Ciphers. Springer-Verlag, 1986.Google Scholar
  28. [28]
    A. Shamir. On the generation of cryptographically strong pseudo-random sequences, 8th Int. Colloquium on Automata, Languages and Programming, LNCS vol. 62, Springer-Verlag, 1981.Google Scholar
  29. [29]
    T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext only, IEEE Trans. Computers, Vol. C-34, No. 1, Jan. 1985, pp. 81–85.Google Scholar
  30. [30]
    T. Storer. Cyclotomy and Difference Sets, Markham Publishing Company, Chicago, 1967.Google Scholar
  31. [31]
    K. C. Zeng, C. H. Yang, T. R. N. Rao. On the linear consistancy test (LCT) in cryptanalysis and its applications, Advances in Cryptology, Crypto'89, Springer-Verlag, LNCS 435, pp. 164–174.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  1. 1.Stutensee-BuechigGermany

Personalised recommendations