Skip to main content

Cryptanalysis of the Energy Efficient Stream Ciphers SSC2

  • Conference paper
Book cover Secure Mobile Ad-hoc Networks and Sensors (MADNES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4074))

Included in the following conference series:

Abstract

The SSC2 is a fast software stream cipher designed for wireless handsets with limited computational capabilities. It is the only one stream cipher which is special designed aim to energy efficient cryptography for wireless sensor networks in recent years open literatures. In this paper, the improved Guess-and-Determine attacks on both LFSR and lagged-Fibonacci half-ciphers of the SSC2 stream cipher are proposed. And some open problems about designing energy efficient stream cipher are discussed.

Supported by the support program for 100 Young and Middle-aged Disciplinary Leaders in Guangxi Higher Education Institutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385–406. John Wiley & Sons, Chichester (2002)

    Google Scholar 

  2. Schneier, B.: Appled cryptography: Protocols, algorithms and source code in C, 2nd edn. John Wiley & Sons Inc., New York (1996)

    Google Scholar 

  3. ETSI. 3GPP TS 35.201. Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 Specification (June 2002)

    Google Scholar 

  4. Bluetooth SIG. Specification of the Bluetooth System 2.0 (Accessed January 2005), Available at: http://www.bluetooth.com

  5. Johansson, T.: Analysis and Design of Modern Stream Ciphers. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, p. 66. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Mitchell, C.J., Dent, A.W.: International standards for stream ciphers: A progress report. SASC-The State of the Art of Stream Ciphers, Novotel Brugge Centrum, Brugge, Belgium (October 14-15, 2004)

    Google Scholar 

  7. NESSIE. NESSIE security report. NES/DOC/ENS/WP5/D20/2 (February 19, 2003)

    Google Scholar 

  8. NESSIE. Nessie Project Announces Final Selection of Crypto Algorithms (February 27, 2003)

    Google Scholar 

  9. http://www.ecrypt.eu.org

  10. ISO/IEC FDIS 18033-4:2005. Information technology – Security techniques – Encryption algorithms – Part 4: Stream ciphers (2005)

    Google Scholar 

  11. Furuya, S., Watanabe, D., Seto, Y., Takaragi, K.: Integrity-aware mode of stream cipher. IEICE Trans. Fundamentals E85-A, 58–65 (2002)

    Google Scholar 

  12. Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Pister, K.S.J., Kahn, J.M., Boser, B.E.: Smart Dust: Wireless networks of milimeter-scale sensor nodes. Highlight Article in 1999 Electronics Research Laboratory Research Summary (1999)

    Google Scholar 

  14. Carroll, C., Chan, A., Zhang, M.: The software-oriented stream cipher SSC-II. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 39–56. Springer, Heidelberg (2001)

    Google Scholar 

  15. Hawkes, P., Rose, G.: Correlation cryptanalysis of SSC2. In: Rump Session of Crypto 2000 (2000)

    Google Scholar 

  16. Hawkes, P., Rose, G.G.: Exploiting multiples of the connection polynomial in word-oriented stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 303–316. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  17. Bleichenbacher, D., Meier, W.: Analysis of SSC2. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 219–233. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  18. Hawkes, P., Quick, F., Rose, G.G.: A practical cryptanalysis of SSC2. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 25–37. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  19. Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. Journal of Cryptology 1(3), 159–176 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  20. Blum, M., Micall, S.: How to generate cryptographically strong sequences of pseudo-random bits. In: Proceedings of 25th IEEE Symposium on Foundations of Computer Science, New York, pp. 850–864 (1982)

    Google Scholar 

  21. Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. Siam J. on Computing, 364–393 (1986)

    Google Scholar 

  22. Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, pp. 80–91. IEEE, New York (1982)

    Google Scholar 

  23. Kocarev, L., Jakimoski, G., Tasev, Z.: Chaos and Pseudo-Randomness. In: Chaos Control: Theory and Applications. Lecture Notes in Control and Information Sciences, vol. 292, pp. 247–264 (2004)

    Google Scholar 

  24. Beker, H., Piper, F.: Cipher Systems. John Wiley, Chichester (1982)

    MATH  Google Scholar 

  25. James, F.: A review of pesudo-random number generators. Computer Physis. Communications 60, 329–344 (1990)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Qin, T., Ni, W., Zhang, S. (2006). Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. In: Burmester, M., Yasinsac, A. (eds) Secure Mobile Ad-hoc Networks and Sensors. MADNES 2005. Lecture Notes in Computer Science, vol 4074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11801412_14

Download citation

  • DOI: https://doi.org/10.1007/11801412_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36646-1

  • Online ISBN: 978-3-540-37863-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics