Attacking the IV Setup of Py and Pypy

نویسندگان

  • Hongjun Wu
  • Bart Preneel
چکیده

In this paper we show that Py and Pypy are practically insecure due to the flaw in their IV setup. With about 2 IVs (with special difference between the IVs), there are two identical keystreams.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Recovery Attack on Py and Pypy with Chosen IVs

In this paper we extend our previous attack to recover the key of Py and Pypy. If the IV size is at least ten bytes, the chosen IV attack can be applied to recover the key information of Py and Pypy. In general, ivsiveb− 9 bytes of the key can be recovered, where ivsizeb indicates the size of the IV in bytes. For example, for 256-bit key and 256-bit IV, the key is reduced to 72 bits with about ...

متن کامل

How to Break Py and Pypy by a Chosen-IV Attack

Biham and Seberry have submitted the stream cipher Py and Pypy to the ECRYPT stream cipher project (eSTREAM). A key recovery attack against Py and Pypy was proposed by Wu and Preneel. In their attack, (IV sizeb − 9) bytes of the key can be recovered with (IV sizeb − 4) × 2 chosen IVs, where IV sizeb indicates the size of the IV in bytes. For a 128-bit key and a 128-bit IV, which are recommended...

متن کامل

Differential Cryptanalysis of the Stream Ciphers

This paper shows that Py and Pypy are practically insecure. If one key is used with about 2 IVs with special differences, with high probability two identical keystreams will appear. This can be exploited in a key recovery attack. For example, for a 16-bye key and a 16-byte IV, 2 chosen IVs can reduce the effective key size to 3 bytes. For a 32-bye key and a 32-byte IV, the effective key size is...

متن کامل

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses

The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py6 were discovered. One main contribution of the paper is the detection of related-key weaknesses in the Py-family of ciphers including the strongest member TPypy. Under related keys, we show a distinguishing attack on ...

متن کامل

Molecular recognition of DNA base pairs by the formamido/pyrrole and formamido/imidazole pairings in stacked polyamides

Polyamides containing an N-terminal formamido (f) group bind to the minor groove of DNA as staggered, antiparallel dimers in a sequence-specific manner. The formamido group increases the affinity and binding site size, and it promotes the molecules to stack in a staggered fashion thereby pairing itself with either a pyrrole (Py) or an imidazole (Im). There has not been a systematic study on the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006