Abstract
AbstractSmall-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design. These ciphers can be classified into several constructions and their basic security requirement is to resist generic attacks, i.e., the time–memory–data tradeoff (TMDTO) attack. In this paper, we investigate the security of small-state constructions in the multi-user setting. Based on it, the TMDTO distinguishing attack and the TMDTO key recovery attack are developed for such a setting. It is shown that SSCs which continuously use the key can not resist the TMDTO distinguishing attack. Moreover, SSCs based on the continuous-IV-key-use construction cannot withstand the TMDTO key recovery attack when the key length is shorter than the IV length, no matter whether the keystream length is limited or not. Finally, we apply these two generic attacks to TinyJAMBU and DRACO in the multi-user setting. The TMDTO distinguishing attack on TinyJAMBU with a 128-bit key can be mounted with time, memory, and data complexities of $$2^{64}$$
2
64
, $$2^{48}$$
2
48
, and $$2^{32}$$
2
32
, respectively. This attack is comparable with a recent work on ToSC 2022, where partial key bits of TinyJAMBU are recovered with more than $$2^{50}$$
2
50
users (or keys). As DRACO’s IV length is smaller than its key length, it is vulnerable to the TMDTO key recovery attack. The resulting attack has a time and memory complexity of both $$2^{112}$$
2
112
, which means DRACO does not provide 128-bit security in the multi-user setting.
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference36 articles.
1. Amin GV, Honggang H (2018) Fruit-80: a secure ultra-lightweight stream cipher for constrained environments. Entropy 20(3):180. https://doi.org/10.3390/e20030180
2. Amin GV, Honggang H, Fujiang L (2019) On designing secure small-state stream ciphers against time-memory-data tradeoff attacks. Cryptology ePrint Archive, Preprint https://eprint.iacr.org/2019/670
3. Armknecht F, Mikhalev V (2015) On lightweight stream ciphers with shorter internal states. In: Fast software encryption—22nd international workshop—FSE 2015—Istanbul, Revised Selected Papers. Lecture Notes in Computer Science, vol 9054, pp 451–470. https://doi.org/10.1007/978-3-662-48116-5_22
4. Babbage SH (1995) Improved “exhaustive search” attacks on stream ciphers. In: European convention on security and detection 1995, pp 161–166. https://doi.org/10.1049/cp:19950490
5. Banik S (2022) Cryptanalysis of draco. IACR Transactions on symmetric cryptology, pp 92–104. https://doi.org/10.46586/tosc.v2022.i4.92-104
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献