Abstract
The SSC2 is a fast software stream cipher designed for wireless handsets with limited computational capabilities. It is the only one stream cipher which is special designed aim to energy efficient cryptography for wireless sensor networks in recent years open literatures. In this paper, the improved Guess-and-Determine attacks on both LFSR and lagged-Fibonacci half-ciphers of the SSC2 stream cipher are proposed. And some open problems about designing energy efficient stream cipher are discussed.
Supported by the support program for 100 Young and Middle-aged Disciplinary Leaders in Guangxi Higher Education Institutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385–406. John Wiley & Sons, Chichester (2002)
Schneier, B.: Appled cryptography: Protocols, algorithms and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)
ETSI. 3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification (June 2002)
Bluetooth SIG. Specification of the Bluetooth System 2.0 (Accessed January 2005), Available at: http://www.bluetooth.com
Johansson, T.: Analysis and Design of Modern Stream Ciphers. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, p. 66. Springer, Heidelberg (2003)
Mitchell, C.J., Dent, A.W.: International standards for stream ciphers: A progress report. SASC-The State of the Art of Stream Ciphers, Novotel Brugge Centrum, Brugge, Belgium (October 14-15, 2004)
NESSIE. NESSIE security report. NES/DOC/ENS/WP5/D20/2 (February 19, 2003)
NESSIE. Nessie Project Announces Final Selection of Crypto Algorithms (February 27, 2003)
ISO/IEC FDIS 18033-4:2005. Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers (2005)
Furuya, S., Watanabe, D., Seto, Y., Takaragi, K.: Integrity-aware mode of stream cipher. IEICE Trans. Fundamentals E85-A, 58–65 (2002)
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)
Pister, K.S.J., Kahn, J.M., Boser, B.E.: Smart Dust: Wireless networks of milimeter-scale sensor nodes. Highlight Article in 1999 Electronics Research Laboratory Research Summary (1999)
Carroll, C., Chan, A., Zhang, M.: The software-oriented stream cipher SSC-II. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 39–56. Springer, Heidelberg (2001)
Hawkes, P., Rose, G.: Correlation cryptanalysis of SSC2. In: Rump Session of Crypto 2000 (2000)
Hawkes, P., Rose, G.G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 303–316. Springer, Heidelberg (2000)
Bleichenbacher, D., Meier, W.: Analysis of SSC2. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 219–233. Springer, Heidelberg (2002)
Hawkes, P., Quick, F., Rose, G.G.: A practical cryptanalysis of SSC2. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 25–37. Springer, Heidelberg (2001)
Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1(3), 159–176 (1989)
Blum, M., Micall, S.: How to generate cryptographically strong sequences of pseudo-random bits. In: Proceedings of 25th IEEE Symposium on Foundations of Computer Science, New York, pp. 850–864 (1982)
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. Siam J. on Computing, 364–393 (1986)
Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, pp. 80–91. IEEE, New York (1982)
Kocarev, L., Jakimoski, G., Tasev, Z.: Chaos and Pseudo-Randomness. In: Chaos Control: Theory and Applications. Lecture Notes in Control and Information Sciences, vol. 292, pp. 247–264 (2004)
Beker, H., Piper, F.: Cipher Systems. John Wiley, Chichester (1982)
James, F.: A review of pesudo-random number generators. Computer Physis. Communications 60, 329–344 (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Y., Qin, T., Ni, W., Zhang, S. (2006). Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. In: Burmester, M., Yasinsac, A. (eds) Secure Mobile Ad-hoc Networks and Sensors. MADNES 2005. Lecture Notes in Computer Science, vol 4074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11801412_14
Download citation
DOI: https://doi.org/10.1007/11801412_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36646-1
Online ISBN: 978-3-540-37863-1
eBook Packages: Computer ScienceComputer Science (R0)