2020
DOI: 10.1007/978-3-030-38471-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Tight Security Bounds for Generic Stream Cipher Constructions

Abstract: The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff attacks (TMD-TO attacks) reduce their effective key length to SL/2, where SL denotes the inner state length. The classical solution, employed, e.g., by eSTREAM portfolio members Trivium [CP05] and Grain v1 [HJM06], is to design the cipher in accordance with the Large-State-Small-Key construction, which implies that SL is at least twice as large as the session key length KL. In the last years, a new line of res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…This research focuses more on hardware-based lightweight ciphers and uses similar information-theoretic methods as the one used in this work. More analysis of LIZARD was recently presented by Banik et al [25] and Hamann and Krause [26].…”
Section: Related Workmentioning
confidence: 99%
“…This research focuses more on hardware-based lightweight ciphers and uses similar information-theoretic methods as the one used in this work. More analysis of LIZARD was recently presented by Banik et al [25] and Hamann and Krause [26].…”
Section: Related Workmentioning
confidence: 99%
“…Three generic stream cipher constructions have been proposed so far: (1) the Lizard construction [HKM17b], (2) the CKEY construction (underlying Fruit [AGH18], Plantlet [MAM16], Sprout [AM15] and Atom [BCI + 21]), and (3) the CIV construction [HKM17a,HKM19]. The CKEY and the CIV construction rely on an enhanced state which will be explained below in Subsection 3.1.…”
Section: Enhanced State Stream Ciphersmentioning
confidence: 99%
“…This principle underlies the stream cipher proposals Sprout, Plantlet, Fruit and Atom. However, it was shown in [HKM19] that the resistance of the CKEY construction against generic TMDTO distinguishing attacks is at most ℓ v /2. Continuous IV.…”
Section: Enhancing the Internal Statementioning
confidence: 99%
See 2 more Smart Citations