Skip to main content

Experimental Statistical Attacks on Block and Stream Ciphers

  • Conference paper
Computational Science and High Performance Computing III

Abstract

Efficient statistical tests, e.g. recently suggested “Book Stack” test, are successfully applied to detect deviations from randomness in bit sequences generated by stream ciphers such as RC4 and ZK-Crypt, as well as by block cipher RC6 (with reduced number of rounds). In case of RC6 a key recovery attack is also mounted. The essence of the tests is briefly described. The experiments data are provided.

The authors were supported by Russian Foundation for Basic Research grant no. 06-07-89025.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rukhin, A., et al (ed.): A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 (rev. May 15, 2001)

    Google Scholar 

  2. Ryabko, B., Pestunov, A.: Probl. Inform. Transm. 40(1), 66–71 (2004)

    Google Scholar 

  3. Ryabko, B., Fionov, A.: Basics of contemporary cryptography for IT practitioners. World Scientific Publishing Co, Singapore (2006)

    Google Scholar 

  4. Dawson, E., Gustafson, H., Henricksen, M., Millan, B.: Evaluation of RC4 stream cipher (2002), http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/

  5. Golic, J.D.: Iterative probabilistic cryptanalysis of RC4 keystream generator. In: Australasian Conf. on Information Security and Privacy (ACISP), pp. 220–233 (2000)

    Google Scholar 

  6. Fluhrer, S., McGrew, D.: Statistical analysis of the alleged RC4 keystream generator source in Lecture Notes In Computer Science. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Pudovkina, M.: Statistical weaknesses in the alleged RC4 keystream generator. Cryptology ePrint Archive (2002), http://eprint.iacr.org/2002/171

  8. Crowley, P.: Small bias in RC4 experimentally verified (2003), http://www.ciphergoth.org/crypto/rc4/

  9. Gressel, C., Granot, R., Vago, G.: ZK-Crypt eSTREAM, ECRYPT Stream Cipher Project (2005), http://www.ecrypt.eu.org/stream/zkcrypt.html

  10. Knudsen, L., Meier, W.: Correlations in RC6 whith a reduced number of rounds. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 94–108. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Miyaji, A., Nonaka, M.: Evaluation of the security of RC6 against the χ 2-attack. IEICE Trans Fundamentals E88-A(1) (2005)

    Google Scholar 

  12. Isogai, N., Matsunaka, T., Miyaji, A.: Optimized χ 2-attack aginst RC6. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 199–211. Springer, Heidelberg (2003)

    Google Scholar 

  13. Ryabko, B., Monarev, V., Shokin, Yu.: Probl. Inform. Transm. 41(4), 385–394 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doroshenko, S., Fionov, A., Lubkin, A., Monarev, V., Ryabko, B., Shokin, Y.I. (2008). Experimental Statistical Attacks on Block and Stream Ciphers . In: Krause, E., Shokin, Y.I., Resch, M., Shokina, N. (eds) Computational Science and High Performance Computing III. Notes on Numerical Fluid Mechanics and Multidisciplinary Design, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69010-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69010-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69008-5

  • Online ISBN: 978-3-540-69010-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics