New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2008

AUTHORS

Shahram Khazaei , Willi Meier

ABSTRACT

In cryptology we commonly face the problem of finding an unknown key K from the output of an easily computable keyed function F(C,K) where the attacker has the power to choose the public variable C. In this work we focus on self-synchronizing stream ciphers. First we show how to model these primitives in the above-mentioned general problem by relating appropriate functions F to the underlying ciphers. Then we apply the recently proposed framework presented at AfricaCrypt’08 by Fischer et. al. for dealing with this kind of problems to the proposed T-function based self-synchronizing stream cipher by Klimov and Shamir at FSE’05 and show how to deduce some non-trivial information about the key. We also open a new window for answering a crucial question raised by Fischer et. al. regarding the problem of finding weak IV bits which is essential for their attack. More... »

PAGES

15-26

Book

TITLE

Progress in Cryptology - INDOCRYPT 2008

ISBN

978-3-540-89753-8
978-3-540-89754-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-89754-5_2

DOI

http://dx.doi.org/10.1007/978-3-540-89754-5_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1045577660


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "EPFL, Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5333.6", 
          "name": [
            "EPFL, Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Khazaei", 
        "givenName": "Shahram", 
        "id": "sg:person.012276436167.96", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012276436167.96"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2008", 
    "datePublishedReg": "2008-01-01", 
    "description": "In cryptology we commonly face the problem of finding an unknown key K from the output of an easily computable keyed function F(C,K) where the attacker has the power to choose the public variable C. In this work we focus on self-synchronizing stream ciphers. First we show how to model these primitives in the above-mentioned general problem by relating appropriate functions F to the underlying ciphers. Then we apply the recently proposed framework presented at AfricaCrypt\u201908 by Fischer et. al. for dealing with this kind of problems to the proposed T-function based self-synchronizing stream cipher by Klimov and Shamir at FSE\u201905 and show how to deduce some non-trivial information about the key. We also open a new window for answering a crucial question raised by Fischer et. al. regarding the problem of finding weak IV bits which is essential for their attack.", 
    "editor": [
      {
        "familyName": "Chowdhury", 
        "givenName": "Dipanwita Roy", 
        "type": "Person"
      }, 
      {
        "familyName": "Rijmen", 
        "givenName": "Vincent", 
        "type": "Person"
      }, 
      {
        "familyName": "Das", 
        "givenName": "Abhijit", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-89754-5_2", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-89753-8", 
        "978-3-540-89754-5"
      ], 
      "name": "Progress in Cryptology - INDOCRYPT 2008", 
      "type": "Book"
    }, 
    "keywords": [
      "self-synchronizing stream cipher", 
      "function", 
      "stream cipher", 
      "C.", 
      "appropriate function f", 
      "ET", 
      "non-trivial information", 
      "Fischer et", 
      "kind of problem", 
      "new window", 
      "keyed function", 
      "cipher", 
      "attacks", 
      "new directions", 
      "information", 
      "questions", 
      "problem", 
      "window", 
      "crucial question", 
      "output", 
      "general problem", 
      "self", 
      "cryptology", 
      "attacker", 
      "primitives", 
      "Shamir", 
      "cryptanalysis", 
      "bits", 
      "framework", 
      "key", 
      "work", 
      "direction", 
      "kind", 
      "power", 
      "function f", 
      "Klimov", 
      "computable keyed function", 
      "public variable C.", 
      "variable C.", 
      "AfricaCrypt\u201908", 
      "FSE\u201905", 
      "Cryptanalysis of Self"
    ], 
    "name": "New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers", 
    "pagination": "15-26", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1045577660"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-89754-5_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-89754-5_2", 
      "https://app.dimensions.ai/details/publication/pub.1045577660"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:17", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_304.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-89754-5_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-89754-5_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-89754-5_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-89754-5_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-89754-5_2'


 

This table displays all metadata directly associated to this object as RDF triples.

122 TRIPLES      23 PREDICATES      68 URIs      61 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-89754-5_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N30957d03c3204a8d9ca489bba25f0506
4 schema:datePublished 2008
5 schema:datePublishedReg 2008-01-01
6 schema:description In cryptology we commonly face the problem of finding an unknown key K from the output of an easily computable keyed function F(C,K) where the attacker has the power to choose the public variable C. In this work we focus on self-synchronizing stream ciphers. First we show how to model these primitives in the above-mentioned general problem by relating appropriate functions F to the underlying ciphers. Then we apply the recently proposed framework presented at AfricaCrypt’08 by Fischer et. al. for dealing with this kind of problems to the proposed T-function based self-synchronizing stream cipher by Klimov and Shamir at FSE’05 and show how to deduce some non-trivial information about the key. We also open a new window for answering a crucial question raised by Fischer et. al. regarding the problem of finding weak IV bits which is essential for their attack.
7 schema:editor N9139e2437b9f4d21b27dd2d318575b59
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N019ce75ee5a6464e8f842a75b58705a6
12 schema:keywords AfricaCrypt’08
13 C.
14 Cryptanalysis of Self
15 ET
16 FSE’05
17 Fischer et
18 Klimov
19 Shamir
20 appropriate function f
21 attacker
22 attacks
23 bits
24 cipher
25 computable keyed function
26 crucial question
27 cryptanalysis
28 cryptology
29 direction
30 framework
31 function
32 function f
33 general problem
34 information
35 key
36 keyed function
37 kind
38 kind of problem
39 new directions
40 new window
41 non-trivial information
42 output
43 power
44 primitives
45 problem
46 public variable C.
47 questions
48 self
49 self-synchronizing stream cipher
50 stream cipher
51 variable C.
52 window
53 work
54 schema:name New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
55 schema:pagination 15-26
56 schema:productId N4deec7764544444db36f9e8c60e0bd7e
57 N82a6a0ff1975416db278ab2e812a9905
58 schema:publisher Nc70b38ee5fbb46fb9a653d35ffca4f56
59 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045577660
60 https://doi.org/10.1007/978-3-540-89754-5_2
61 schema:sdDatePublished 2022-01-01T19:17
62 schema:sdLicense https://scigraph.springernature.com/explorer/license/
63 schema:sdPublisher Nd6542ebca30a470dad254330c6a41ba1
64 schema:url https://doi.org/10.1007/978-3-540-89754-5_2
65 sgo:license sg:explorer/license/
66 sgo:sdDataset chapters
67 rdf:type schema:Chapter
68 N019ce75ee5a6464e8f842a75b58705a6 schema:isbn 978-3-540-89753-8
69 978-3-540-89754-5
70 schema:name Progress in Cryptology - INDOCRYPT 2008
71 rdf:type schema:Book
72 N1d4f6389d77a45b78003844fdce17a06 schema:familyName Chowdhury
73 schema:givenName Dipanwita Roy
74 rdf:type schema:Person
75 N2caa9c8ee1a84bbe8f52ffc20eb1f3f3 schema:familyName Das
76 schema:givenName Abhijit
77 rdf:type schema:Person
78 N30957d03c3204a8d9ca489bba25f0506 rdf:first sg:person.012276436167.96
79 rdf:rest N38ed4b6ec13e46f6b5fa1e4029e254c5
80 N38ed4b6ec13e46f6b5fa1e4029e254c5 rdf:first sg:person.07653531142.18
81 rdf:rest rdf:nil
82 N4deec7764544444db36f9e8c60e0bd7e schema:name dimensions_id
83 schema:value pub.1045577660
84 rdf:type schema:PropertyValue
85 N502f1be8dd7a4803812c3a94b0965695 rdf:first N2caa9c8ee1a84bbe8f52ffc20eb1f3f3
86 rdf:rest rdf:nil
87 N53fad962240f446abe6b3b30280f040e rdf:first Nfc6b11c272f443608167670b8b50192f
88 rdf:rest N502f1be8dd7a4803812c3a94b0965695
89 N82a6a0ff1975416db278ab2e812a9905 schema:name doi
90 schema:value 10.1007/978-3-540-89754-5_2
91 rdf:type schema:PropertyValue
92 N9139e2437b9f4d21b27dd2d318575b59 rdf:first N1d4f6389d77a45b78003844fdce17a06
93 rdf:rest N53fad962240f446abe6b3b30280f040e
94 Nc70b38ee5fbb46fb9a653d35ffca4f56 schema:name Springer Nature
95 rdf:type schema:Organisation
96 Nd6542ebca30a470dad254330c6a41ba1 schema:name Springer Nature - SN SciGraph project
97 rdf:type schema:Organization
98 Nfc6b11c272f443608167670b8b50192f schema:familyName Rijmen
99 schema:givenName Vincent
100 rdf:type schema:Person
101 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
102 schema:name Information and Computing Sciences
103 rdf:type schema:DefinedTerm
104 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
105 schema:name Data Format
106 rdf:type schema:DefinedTerm
107 sg:person.012276436167.96 schema:affiliation grid-institutes:grid.5333.6
108 schema:familyName Khazaei
109 schema:givenName Shahram
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012276436167.96
111 rdf:type schema:Person
112 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
113 schema:familyName Meier
114 schema:givenName Willi
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
116 rdf:type schema:Person
117 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
118 schema:name FHNW, Windisch, Switzerland
119 rdf:type schema:Organization
120 grid-institutes:grid.5333.6 schema:alternateName EPFL, Lausanne, Switzerland
121 schema:name EPFL, Lausanne, Switzerland
122 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...