research & development
On the Security
- f IV Dependent Stream Ciphers
On the Security of IV Dependent Stream Ciphers Cme Berbain and - - PowerPoint PPT Presentation
On the Security of IV Dependent Stream Ciphers Cme Berbain and Henri Gilbert France Telecom R&D {firstname.lastname@orange-ftgroup.com} research & development Stream Ciphers IV-less IV-dependent key K IV (initial value)
research & development
IV setup – H. Gilbert (2) research & developement Orange Group
e.g. RC4, Shrinking Generator well founded theory [S81,Y82,BM84] practical limitations:
e.g. SNOW, Scream, eSTREAM ciphers less unanimously agreed theory prior work [RC94, HN01, Z06] numerous chosen IV attacks
IV setup – H. Gilbert (3) research & developement Orange Group
whole cipher key and IV setup
blockcipher based tree based
incorporate key and IV setup in QUAD's provable security argument
IV setup – H. Gilbert (4) research & developement Orange Group
Z K PRNG g
) ( ,
PRNG g t A T A PRNG g ≤
80 <<
g
IV setup – H. Gilbert (5) research & developement Orange Group
PRF G A PRF G
* =
g g PRF G
K
40 80
G
IV setup – H. Gilbert (6) research & developement Orange Group
IV setup – H. Gilbert (7) research & developement Orange Group
IV setup – H. Gilbert (8) research & developement Orange Group
Composition of {fK} and g Composition Theorem:
PRNG g PRF F PRF G
IV setup – H. Gilbert (9) research & developement Orange Group
IV setup – H. Gilbert (10) research & developement Orange Group
Block cipher based (not detailed here)
Tree based (detailed in the sequel)
IV setup – H. Gilbert (11) research & developement Orange Group
0 1 1 1 0 1 1
PRNG f PRF F
IV setup – H. Gilbert (12) research & developement Orange Group
0 1 1 1 0 1 1
IV1 IV2 IV3 IVn-1 IVn
IV setup – H. Gilbert (13) research & developement Orange Group
k i k i k i j i j i k j i n k
, 1
≤
n n
1
IV setup – H. Gilbert (14) research & developement Orange Group
n n
1
IV setup – H. Gilbert (15) research & developement Orange Group
Th [BGP06]:
in the GF(2) case, if there exists a distinguisher for g allowing to distinguish a sequence of keystream bits associated with a random quadratic systems S and a random initial state value x in time T with advantage ε, then there is an MQ solver that solves a random instance of MQ in time with probability .
Example of application: q=2, n = 350 bits, t = 2, L=240, T=280, ε = 1%
(no such concrete reduction for the recommend value n = 160)
) ( '
2 2 2
ε λ ≅ T n O T λ ε = ε
2
2 ' n t L ) 1 ( − λ =
Keystream generation, GF(2) case
IV setup – H. Gilbert (16) research & developement Orange Group
IV setup – H. Gilbert (17) research & developement Orange Group
Th: in the GF(2) case, if there exists a (T,q) PRF-distinguisher for the family G of IV to
keystream functions associated with a random key and a random quadratic systems S with PRF-advantage ε, then there is an MQ solver that solves a random instance of MQ in time with probability at least .
Example of application: q=2, n = 760 bits, t = 2, L=240, T=280, ε = 1% ) ( '
2 2 2 2
ε λ ≅ T q n O T λ ε = ε q
3
2 . 3 ' ) (
2
n n L + = λ
Whole cipher, GF(2) case
IV (n bits)
IV setup – H. Gilbert (18) research & developement Orange Group
Requirements: a PRF is needed Conservative IV setup
seems demanding w.r.t. computational complexity is not demanding w.r.t. implementation complexity
"Provable security" can be extended to IV-dependent stream ciphers