On the Security of IV Dependent Stream Ciphers View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007-01-01

AUTHORS

Côme Berbain , Henri Gilbert

ABSTRACT

Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher quad [3] uses this tree-based construction and that consequently the security proof for quad’s keystream generation part given in [3] can be extended to incorporate the key and IV setup. More... »

PAGES

254-273

Book

TITLE

Fast Software Encryption

ISBN

978-3-540-74617-1
978-3-540-74619-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_17

DOI

http://dx.doi.org/10.1007/978-3-540-74619-5_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1007864232


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Issy les Moulineaux Cedex 9, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Issy les Moulineaux Cedex 9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Berbain", 
        "givenName": "C\u00f4me", 
        "id": "sg:person.011123560622.27", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011123560622.27"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Issy les Moulineaux Cedex 9, France", 
          "id": "http://www.grid.ac/institutes/grid.89485.38", 
          "name": [
            "France T\u00e9l\u00e9com R&D, 38\u201340, rue du G\u00e9n\u00e9ral Leclerc, 92794 Issy les Moulineaux Cedex 9, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gilbert", 
        "givenName": "Henri", 
        "id": "sg:person.012771236207.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2007-01-01", 
    "datePublishedReg": "2007-01-01", 
    "description": "Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher quad [3] uses this tree-based construction and that consequently the security proof for quad\u2019s keystream generation part given in [3] can be extended to incorporate the key and IV setup.", 
    "editor": [
      {
        "familyName": "Biryukov", 
        "givenName": "Alex", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-74619-5_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-74617-1", 
        "978-3-540-74619-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "pseudo-random number generator", 
      "pseudo-random function", 
      "stream cipher", 
      "tree-based construction", 
      "generic construction", 
      "security proof", 
      "secret key", 
      "recent attacks", 
      "cipher", 
      "generation part", 
      "difficult task", 
      "number generator", 
      "security", 
      "key", 
      "moderate cost", 
      "setup components", 
      "task", 
      "attacks", 
      "initial value", 
      "construction", 
      "input", 
      "cost", 
      "proof", 
      "quad", 
      "setup", 
      "generator", 
      "subcase", 
      "components", 
      "part", 
      "function", 
      "values", 
      "composition", 
      "paper"
    ], 
    "name": "On the Security of IV Dependent Stream Ciphers", 
    "pagination": "254-273", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1007864232"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-74619-5_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-74619-5_17", 
      "https://app.dimensions.ai/details/publication/pub.1007864232"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-11-24T21:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221124/entities/gbq_results/chapter/chapter_182.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-74619-5_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-74619-5_17'


 

This table displays all metadata directly associated to this object as RDF triples.

99 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-74619-5_17 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Ne85a266548354884be3242a3beb25e5c
4 schema:datePublished 2007-01-01
5 schema:datePublishedReg 2007-01-01
6 schema:description Almost all the existing stream ciphers are using two inputs: a secret key and an initial value (IV). However recent attacks indicate that designing a secure IV-dependent stream cipher and especially the key and IV setup component of such a cipher remains a difficult task. In this paper we first formally establish the security of a well known generic construction for deriving an IV-dependent stream cipher, namely the composition of a key and IV setup pseudo-random function (PRF) with a keystream generation pseudo-random number generator (PRNG). We then present a tree-based construction allowing to derive a IV-dependent stream cipher from a PRNG for a moderate cost that can be viewed as a subcase of the former generic construction. Finally we show that the recently proposed stream cipher quad [3] uses this tree-based construction and that consequently the security proof for quad’s keystream generation part given in [3] can be extended to incorporate the key and IV setup.
7 schema:editor N358bd6e89f4c497fbd04159787d05073
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nd921f85bfac64e4088f987bcdbe70ed5
11 schema:keywords attacks
12 cipher
13 components
14 composition
15 construction
16 cost
17 difficult task
18 function
19 generation part
20 generator
21 generic construction
22 initial value
23 input
24 key
25 moderate cost
26 number generator
27 paper
28 part
29 proof
30 pseudo-random function
31 pseudo-random number generator
32 quad
33 recent attacks
34 secret key
35 security
36 security proof
37 setup
38 setup components
39 stream cipher
40 subcase
41 task
42 tree-based construction
43 values
44 schema:name On the Security of IV Dependent Stream Ciphers
45 schema:pagination 254-273
46 schema:productId N4fd86e4641554a62bcc0e7cb874d0ce9
47 Nf64cf7f2e7cd4db59e054d193a837919
48 schema:publisher N0434d11babb54ca88c8a8283f001fad7
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007864232
50 https://doi.org/10.1007/978-3-540-74619-5_17
51 schema:sdDatePublished 2022-11-24T21:12
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N502e6bd95a6b47cba7d01551acdf09cf
54 schema:url https://doi.org/10.1007/978-3-540-74619-5_17
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N0434d11babb54ca88c8a8283f001fad7 schema:name Springer Nature
59 rdf:type schema:Organisation
60 N043f9fc410184b7eaa39f50c8d6faf39 schema:familyName Biryukov
61 schema:givenName Alex
62 rdf:type schema:Person
63 N33d381eee26c49359efdb35e92a35b89 rdf:first sg:person.012771236207.08
64 rdf:rest rdf:nil
65 N358bd6e89f4c497fbd04159787d05073 rdf:first N043f9fc410184b7eaa39f50c8d6faf39
66 rdf:rest rdf:nil
67 N4fd86e4641554a62bcc0e7cb874d0ce9 schema:name dimensions_id
68 schema:value pub.1007864232
69 rdf:type schema:PropertyValue
70 N502e6bd95a6b47cba7d01551acdf09cf schema:name Springer Nature - SN SciGraph project
71 rdf:type schema:Organization
72 Nd921f85bfac64e4088f987bcdbe70ed5 schema:isbn 978-3-540-74617-1
73 978-3-540-74619-5
74 schema:name Fast Software Encryption
75 rdf:type schema:Book
76 Ne85a266548354884be3242a3beb25e5c rdf:first sg:person.011123560622.27
77 rdf:rest N33d381eee26c49359efdb35e92a35b89
78 Nf64cf7f2e7cd4db59e054d193a837919 schema:name doi
79 schema:value 10.1007/978-3-540-74619-5_17
80 rdf:type schema:PropertyValue
81 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
82 schema:name Information and Computing Sciences
83 rdf:type schema:DefinedTerm
84 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
85 schema:name Data Format
86 rdf:type schema:DefinedTerm
87 sg:person.011123560622.27 schema:affiliation grid-institutes:grid.89485.38
88 schema:familyName Berbain
89 schema:givenName Côme
90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011123560622.27
91 rdf:type schema:Person
92 sg:person.012771236207.08 schema:affiliation grid-institutes:grid.89485.38
93 schema:familyName Gilbert
94 schema:givenName Henri
95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012771236207.08
96 rdf:type schema:Person
97 grid-institutes:grid.89485.38 schema:alternateName France Télécom R&D, 38–40, rue du Général Leclerc, 92794 Issy les Moulineaux Cedex 9, France
98 schema:name France Télécom R&D, 38–40, rue du Général Leclerc, 92794 Issy les Moulineaux Cedex 9, France
99 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...