Cryptanalysis of Stream Cipher DECIM

نویسندگان

  • Hongjun Wu
  • Bart Preneel
چکیده

Stream cipher DECIM is a hardware oriented cipher with 80-bit key and 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. It causes about half of the key bits being recovered bit-by-bit when one key is used with about 2 random IVs, and only the first two bytes of each keystream are needed in the attack. The amount of computations required in the attack is negligible. Another flaw is in the keystream generation algorithm of DECIM. It causes the keystream heavily biased. Any two adjacent keystream bits would be equal with probability about 1 2 + 2−9. A message could be recovered from the ciphertexts if that message is encrypted by DECIM for about 2 times. The DECIM with 80-bit key and 80-bit IV is also vulnerable to the attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Stream Cipher DECIM

DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. It allows to recover about half of the key bits bit-by-bit when one key is used with about 2 random IVs; only the first two bytes of each keystream are needed in the attack. The amount of computation required in the at...

متن کامل

Cryptanalysis and Design of Stream Ciphers

This thesis presents some novel results on the cryptanalysis and design of stream ciphers. The first part of the thesis introduces various stream ciphers design and cryptanalysis techniques. The second part of the thesis gives the cryptanalysis of seven stream ciphers. The properties of addition are exploited in the cryptanalysis of two stream ciphers: the differential-linear cryptanalysis agai...

متن کامل

v2 ∗ DECIM

Decim is a hardware oriented stream cipher with 80-bit key and 64-bit IV which was submitted to the ECRYPT stream cipher project. The design of Decim is based on both a nonlinear filter LFSR and an irregular decimation mechanism called the ABSG. As a consequence, Decim is of low hardware complexity. Recently, Hongjun Wu and Bart Preneel pointed out two flaws in the stream cipher Decim. The firs...

متن کامل

Comparative Study of DECIM-128 and DECIMV2 in relation to Compact Hash-based Message Authentication Code

constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement hashing for highly compact MAC, whi...

متن کامل

Decim − 128 ∗

Decim is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. The design of Decim is based on both a non linearly filtered LFSR and an irregular decimation mechanism called the ABSG. While the initial call for contributions required hardware-oriented stream ciphers to manage 80-bit secret keys and 64-bit public initialization, designers have been invited to demonstra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005