Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2002/142

On the Applicability of Distinguishing Attacks Against Stream Ciphers

Greg Rose and Philip Hawkes

Abstract

We demonstrate that the existence of distinguishing attacks against stream ciphers is unrelated to their security in practical use, and in particular that the amount of data required to perform a distinguishing attack is unrelated to the key length of the cipher. The implication for the NESSIE Project is that no submitted symmetric cipher would be accepted under the unpublished rules for distinguishing attacks, not even the block ciphers in Counter Mode or Output Feedback Mode.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Submitted to third NESSIE workshop
Keywords
distinguishing attackstream cipher
Contact author(s)
ggr @ qualcomm com
History
2002-09-17: received
Short URL
https://ia.cr/2002/142
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2002/142,
      author = {Greg Rose and Philip Hawkes},
      title = {On the Applicability of Distinguishing Attacks Against Stream Ciphers},
      howpublished = {Cryptology {ePrint} Archive, Paper 2002/142},
      year = {2002},
      url = {https://eprint.iacr.org/2002/142}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.