Planned intervention: On Wednesday April 3rd 05:30 UTC Zenodo will be unavailable for up to 2-10 minutes to perform a storage cluster upgrade.
Published November 23, 2007 | Version 11364
Journal article Open

A Distinguish Attack on COSvd Cipher

Description

The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-boxes don-t select uniformly. We use this property for an Improve distinguish attack.

Files

11364.pdf

Files (9.0 MB)

Name Size Download all
md5:49450df9c5541ef69ab7a291b05b2a1a
9.0 MB Preview Download

Additional details

References

  • E. Filiol, C. Fontaine, S. Josse. The COSvd Ciphers, SASC: the State of the Art of Stream Ciphers, NoE ECRYPT Workshop, 2004.
  • E. Filiol, C. Fontaine. A new Ultrafast Stream Ciphers Design: COS Ciphers , Proceedings of the 8th IMA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2260, pp. 85-98, Springer Verlag, 2001.
  • H. Wu and F. Bao, Cryptanalysis of stream cipher COS (2, 128) mode I. In Australian Conference on Information Security and Privacy, ACISP 2002, number 2384 in Lecture Notes in Computer Science, pages 154- 158. Springer-Verlag, 2002.
  • S. Babbage, The COS Stream Ciphers are Extremely Weak, http://eprint.iacr.org/2001/078
  • http://www_rocq.inria.fr/codes/Eric.Filiol/English/COS/COS.html
  • A.P. Fontana, On a proposed symbolic dynamics for the Henon map, Thesis, Naval postgraduate school, June 1993.
  • M. Henon, A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 1976, vol. 50, pages 69-77.
  • D. Erdmann, S. Murphy Henon, Stream Cipher, Electronic Letters, vol. 28, no 9, pages 893-895, 1992.
  • P. Ekdahl, On LFSR based Stream Ciphers Analysis and Design. Phd Thesis, Lund University, 2003. [10] T. Cover, J.A. Thomas, Elements of information theory, Wiley series in Telecommunication, Wiley, 1991.