Algebraic analysis of the SSS stream cipher


Autoria(s): Al Mashrafi, Mufeed; Koon-Ho Wong, Kenneth; Simpson, Leonie; Bartlett, Harry; Dawson, Edward
Data(s)

2011

Resumo

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/48792/

Publicador

ACM

Relação

http://eprints.qut.edu.au/48792/1/48792.pdf

DOI:10.1145/2070425.2070457

Al Mashrafi, Mufeed, Koon-Ho Wong, Kenneth , Simpson, Leonie, Bartlett, Harry, & Dawson, Edward (2011) Algebraic analysis of the SSS stream cipher. In Proceedings of the 4th international conference on Security of information and networks, ACM, Macquarie Graduate School of Management, Sydney, NSW, pp. 199-204.

Direitos

Copyright 2011 ACM

Fonte

School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #algebraic attacks #stream ciphers #SSS #eSTREAM #multivariate equations
Tipo

Conference Paper