Abstract
Efficient statistical tests, e.g. recently suggested “Book Stack” test, are successfully applied to detect deviations from randomness in bit sequences generated by stream ciphers such as RC4 and ZK-Crypt, as well as by block cipher RC6 (with reduced number of rounds). In case of RC6 a key recovery attack is also mounted. The essence of the tests is briefly described. The experiments data are provided.
The authors were supported by Russian Foundation for Basic Research grant no. 06-07-89025.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rukhin, A., et al (ed.): A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 (rev. May 15, 2001)
Ryabko, B., Pestunov, A.: Probl. Inform. Transm. 40(1), 66–71 (2004)
Ryabko, B., Fionov, A.: Basics of contemporary cryptography for IT practitioners. World Scientific Publishing Co, Singapore (2006)
Dawson, E., Gustafson, H., Henricksen, M., Millan, B.: Evaluation of RC4 stream cipher (2002), http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/
Golic, J.D.: Iterative probabilistic cryptanalysis of RC4 keystream generator. In: Australasian Conf. on Information Security and Privacy (ACISP), pp. 220–233 (2000)
Fluhrer, S., McGrew, D.: Statistical analysis of the alleged RC4 keystream generator source in Lecture Notes In Computer Science. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978. Springer, Heidelberg (2001)
Pudovkina, M.: Statistical weaknesses in the alleged RC4 keystream generator. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/171
Crowley, P.: Small bias in RC4 experimentally verified (2003), http://www.ciphergoth.org/crypto/rc4/
Gressel, C., Granot, R., Vago, G.: ZK-Crypt eSTREAM, ECRYPT Stream Cipher Project (2005), http://www.ecrypt.eu.org/stream/zkcrypt.html
Knudsen, L., Meier, W.: Correlations in RC6 whith a reduced number of rounds. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 94–108. Springer, Heidelberg (2001)
Miyaji, A., Nonaka, M.: Evaluation of the security of RC6 against the χ 2-attack. IEICE Trans Fundamentals E88-A(1) (2005)
Isogai, N., Matsunaka, T., Miyaji, A.: Optimized χ 2-attack aginst RC6. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 199–211. Springer, Heidelberg (2003)
Ryabko, B., Monarev, V., Shokin, Yu.: Probl. Inform. Transm. 41(4), 385–394 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Doroshenko, S., Fionov, A., Lubkin, A., Monarev, V., Ryabko, B., Shokin, Y.I. (2008). Experimental Statistical Attacks on Block and Stream Ciphers . In: Krause, E., Shokin, Y.I., Resch, M., Shokina, N. (eds) Computational Science and High Performance Computing III. Notes on Numerical Fluid Mechanics and Multidisciplinary Design, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69010-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-69010-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69008-5
Online ISBN: 978-3-540-69010-8
eBook Packages: EngineeringEngineering (R0)