Abstract
This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic transformation densities are introduced, and their relations with other cryptographic factors are summarized. This work is illustrated by reference to the design and security of additive natural stream ciphers, which are nonlinear filtered sequences driven by a counter rather than by a shift register.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. J. Anderson. Solving a class of stream ciphers, Cryptologia 14, no. 3, 1990, pp. 285–288.
R. J. Anderson. Fast Attack on Certain Stream Ciphers, Electronics Letters, 22nd July 1993, Vol. 29, No. 15, pp. 1322–1323.
R. J. Anderson. Derived sequence attacks on stream ciphers, presented at the Rump Session of Crypto'93.
L. D. Baumert. Cyclic Difference Sets, Lecture Notes on Mathematics, Vol. 182, Springer-Verlag, 1971.
H. Beker, F. Piper. Cipher Systems: The Protection of Communications, Northwood Books, London, 1982.
D. Coppersmith, H. Krawczyk, Y. Mansour. The Shrinking Generator, Preproceedings of Crypto'93.
E. Biham, A. Shamir. Differential cryptanalysis of DES-like crypto systems, Advances in Cryptology, Proc. of Crypto '90, LNCS, Springer-Verlag, 1990.
E. Biham. On the applicability of differential cryptanalysis to hash functions, E.I.S.S. Workshop on Cryptographic Hash Functions, Oberwolfach (D), March 25–27, 1992.
L. Blum, M. Blum, M. Shub. A simple unpredictable pseudorandom number operator, SIAM J. Comput. 15, pp. 364–383.
J. O. Brüer. On pseudorandom sequences as crypto generators, Proc. of Int. Zürich Sem. on Digital Communic, Zürich, Swithland, 1984.
W. Diffie, M. Hellman. Privacy and authentication: An introduction to cryptography, Proc. IEEE, vol. 67(3), Mar. 1979, pp. 397–427.
C. Ding, G. Xiao, W. Shan. The Stability Theory of Stream Ciphers. LNCS, vol. 561, Springer-Verlag, 1991.
P. R. Geffe. How to protect data with ciphers that are really hard to break, Electronics, Jan. 4, 1973.
J. Golič, M. Mihaljevič. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance, J. Cryptology, Vol. 3(3), pp. 201–212, 1991.
D. Gollmann, W. G. Chambers. A Cryptanalysis of Step k,m -Cascadeds, Proc. Eurocrypt'89, J. Quisquater, J. Vandewalle (eds.), Springer-Verlag, LNCS 434, pp. 680–687, 1990.
D. Gollmann, W. G. Chambers, clock-controlled shift registers: A review, IEEE J. on Selected Areas in Communications, vol. 7, no. 4, May 1989, pp. 525–533.
S. M. Jennings. Multiplexed sequences: Some properties of the minimal polynomial, LNCS, vol. 149, Springer-Verlag; 1983, pp. 189–206.
E. L. Key. An analysis of the structure and complexity of nonlinear binary sequences generators, IEEE Trans. Inform. Theory, vol. IT-22, no. 6, Nov. 1976, pp. 732–763.
A. Klapper, M. Goresky. 2-adic shift registers, Proc. of the 1993 Cambridge Algorithm Workshop, December 9–11 1993 (this volume)
J. L. Massey, I. Ingemarsson. The Rip van Winkel Cipher: A simple and provably computationally secure cipher with a finite key, in IEEE Int. Symp. on Inform. Theory, (Brighton, England), Abstr. June 24–28, 1985, pp. 146.
U. Maurer. A provably-secure strongly randomized cipher, in Advances in Cryptology, Eurocrypt'90, I. Damgård, Ed., LNCS, vol. 473, Springer-Verlag, 1991, pp. 361–373.
W. Meier, O. Staffelbach. Fast correlation attacks on certain stream ciphers, J. Cryptology, Vol. 1(3), pp. 159–176, 1989.
R. Mennicocci. Cryptanalysis of a two-stage Gollmann cascade generator, Proc. of SPRC'93, W. Wolfowicz (ed.), pp. 62–69, 1993.
K. Nyberg, L. R. Knudsen. Provable security against differential cryptanalysis, Advances in Cryptology: Eurocrypt'92.
V. S. Pless. Encryption schemes for computer confidentiallity, IEEE Trans. Cornput., vol. C-26, Nov. 1977, pp. 756–763.
B. Preneel, R. Govaerts, J. Vandewalle. Differential Cryptanalysis of Hash Functions Based on Block Ciphers, Proc. of the 1st ACM Conference on Computer & Communications Security, Fairfax VA, Nov 1993, published by the ACM pp. 183–188.
R. A. Rueppel. Design and Analysis of Stream Ciphers. Springer-Verlag, 1986.
A. Shamir. On the generation of cryptographically strong pseudo-random sequences, 8th Int. Colloquium on Automata, Languages and Programming, LNCS vol. 62, Springer-Verlag, 1981.
T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext only, IEEE Trans. Computers, Vol. C-34, No. 1, Jan. 1985, pp. 81–85.
T. Storer. Cyclotomy and Difference Sets, Markham Publishing Company, Chicago, 1967.
K. C. Zeng, C. H. Yang, T. R. N. Rao. On the linear consistancy test (LCT) in cryptanalysis and its applications, Advances in Cryptology, Crypto'89, Springer-Verlag, LNCS 435, pp. 164–174.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ding, C. (1994). The differential cryptanalysis and design of natural stream ciphers. In: Anderson, R. (eds) Fast Software Encryption. FSE 1993. Lecture Notes in Computer Science, vol 809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58108-1_13
Download citation
DOI: https://doi.org/10.1007/3-540-58108-1_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58108-6
Online ISBN: 978-3-540-48456-1
eBook Packages: Springer Book Archive