A Framework for Chosen IV Statistical Analysis of Stream Ciphers

@inproceedings{Englund2007AFF,
  title={A Framework for Chosen IV Statistical Analysis of Stream Ciphers},
  author={H{\aa}kan Englund and Thomas Johansson and Meltem S{\"o}nmez Turan},
  booktitle={INDOCRYPT},
  year={2007}
}
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generalize this idea and propose a framework for chosen IV statistical attacks using a polynomial description. We propose a few new statistical attacks, apply them on some existing stream cipher proposals, and give some conclusions regarding the strength of their IV initialization. In particular, we experimentally detected… CONTINUE READING
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 69 extracted citations

High order differential attacks on stream ciphers

Cryptography and Communications • 2012
View 6 Excerpts
Highly Influenced

Symbolic computation in block cipher with application to PRESENT

IACR Cryptology ePrint Archive • 2012
View 4 Excerpts
Highly Influenced

Multiple-chi-square tests and their application on distinguishing attacks

2011 8th International ISC Conference on Information Security and Cryptology • 2011
View 10 Excerpts
Highly Influenced

PAR Shahram KHAZAEI

View 10 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Decim v2

View 6 Excerpts
Highly Influenced

A Stream Cipher Proposal: Grain-128

2006 IEEE International Symposium on Information Theory • 2006
View 10 Excerpts

Extending the Resynchronization Attack

IACR Cryptology ePrint Archive • 2004
View 1 Excerpt

Golic and Guglielmo Morgari . On the resynchronization attack

Jovan Dj.
2003

A New Statistical Testing for Symmetric Ciphers and Hash Functions

IACR Cryptology ePrint Archive • 2002
View 2 Excerpts

Similar Papers

Loading similar papers…