|Authors:||Mihaljević, Miodrag J.
|Affiliations:||Mathematical Institute of the Serbian Academy of Sciences and Arts||Title:||A security evaluation of certain stream ciphers which involve randomness and coding||Journal:||ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications||First page:||789||Last page:||794||Conference:||20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010||Issue Date:||1-Dec-2010||ISBN:||978-142446017-5||DOI:||10.1109/ISITA.2010.5649616||Abstract:||
Following some of the recently reported results, an approach for design of stream ciphers has been considered which is based on joint employment of pseudorandomness, randomness and dedicated wire-tap channel and error correction coding. The wire-tap channel coding controlled by the randomness, provides that an attacker faces not only the traditional problems of cryptanalysis but also the problem of decoding without the secret key which appears as complex as the exhaustive search over the possible secret keys. Security evaluation has been performed based on the algebraic representation of the proposed stream cipher. The given security evaluation has addressed hardness of the algebraic recovering of the secret key in the CPA scenario. It is shown that the secret key recovery is as hard as the LPNε problem where ε = 1-(1-2p) (m-ℓ)/2/2 and m, ℓ and p are the stream cipher parameters.
|Keywords:||Algebraic representations | Error correction coding | Exhaustive search | Pseudorandomness | Secret key | Security evaluation | Stream Ciphers||Publisher:||IEEE|
Show full item record
checked on Oct 2, 2022
checked on Oct 3, 2022
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.