A Distinguish Attack on COSvd Cipher
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
A Distinguish Attack on COSvd Cipher

Authors: Mohammad Ali Orumiehchi ha, R. Mirghadri

Abstract:

The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-boxes don-t select uniformly. We use this property for an Improve distinguish attack.

Keywords: Stream cipher, COSvd cipher, distinguish attack, nonlinear feedback shift registers, chaotic layer.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334784

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1110

References:


[1] E. Filiol, C. Fontaine, S. Josse. The COSvd Ciphers, SASC: the State of the Art of Stream Ciphers, NoE ECRYPT Workshop, 2004.
[2] E. Filiol, C. Fontaine. A new Ultrafast Stream Ciphers Design: COS Ciphers , Proceedings of the 8th IMA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2260, pp. 85-98, Springer Verlag, 2001.
[3] H. Wu and F. Bao, Cryptanalysis of stream cipher COS (2, 128) mode I. In Australian Conference on Information Security and Privacy, ACISP 2002, number 2384 in Lecture Notes in Computer Science, pages 154- 158. Springer-Verlag, 2002.
[4] S. Babbage, The COS Stream Ciphers are Extremely Weak, http://eprint.iacr.org/2001/078
[5] http://www_rocq.inria.fr/codes/Eric.Filiol/English/COS/COS.html
[6] A.P. Fontana, On a proposed symbolic dynamics for the Henon map, Thesis, Naval postgraduate school, June 1993.
[7] M. Henon, A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 1976, vol. 50, pages 69-77.
[8] D. Erdmann, S. Murphy Henon, Stream Cipher, Electronic Letters, vol. 28, no 9, pages 893-895, 1992.
[9] P. Ekdahl, On LFSR based Stream Ciphers Analysis and Design. Phd Thesis, Lund University, 2003.
[10] T. Cover, J.A. Thomas, Elements of information theory, Wiley series in Telecommunication, Wiley, 1991.