A new distinguishing attack scenario for stream ciphers, allowing a resynchronization collision attack, is presented. The attack can succeed if the part of the state that depends on both the key and the IV is smaller than twice the key size. It is shown that the attack is applicable to block ciphers in OFB mode. For OFB mode, the attack is more powerful than the previously known generic distinguishing attack since it will directly recover a part of the plaintext while having the same asymptotic complexity as the generic distinguishing attack. The attack is also demonstrated on the eSTREAM candidate LEX. LEX is not vulnerable to any of the previously known generic distinguishing attack but is vulnerable to the new attack. It is shown that if...
We revisit the different approaches used in the literature to estimate the data complexity of distin...
Abstract: In this paper, we present an extension to the resynchronization attack on stream ciphers o...
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. Th...
Abstract. WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project....
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, th...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underl...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher ...
We revisit the different approaches used in the literature to estimate the data complexity of distin...
Abstract: In this paper, we present an extension to the resynchronization attack on stream ciphers o...
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. Th...
Abstract. WG and LEX are two stream ciphers submitted to eStream – the ECRYPT stream cipher project....
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is...
In this paper, we propose two new attacks against stream cipher RC4 which can recover the secret key...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, th...
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In pr...
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constru...
This paper overviews basic theory on distinguishing attacks on stream ciphers. It illustrates underl...
A linear distinguishing attack on the stream cipher Scream is proposed. When the keystream is of len...
Abstract. Side-channel attacks on block ciphers and public key algorithms have been discussed extens...
Abstract: This paper studies the security of a newly proposed stream cipher structure based on line...
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher ...
We revisit the different approaches used in the literature to estimate the data complexity of distin...
Abstract: In this paper, we present an extension to the resynchronization attack on stream ciphers o...
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. Th...