Paper Abstract and Keywords |
Presentation |
2008-02-29 08:55
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In this paper, we evaluate the strength of a revised version of Enocoro-128 (Enocoro-128 ver.1.1), proposed at SCIS 2008, against resynchronization attack.
We consider linear/differential characteristic as the correlation of IV and keystream ,
by evaluating maximum linear/differential characteristic probability by truncated linear/differential cryptanalysis.
Using Viterbi algorithm, we search for the truncated path with minimum number of active sboxes as strength evaluation.
As a result, the maximum linear characteristic probability of Enocoro-128 ver.1.1 is 2^{-216} and
the maximum differential characteristic probability of Enocoro-128 ver.1.1 is 2^{-177.8}.
Thus, it is shown that Enocoro-128 ver. 1.1 has enough strength against linear/differential resynchronization attack. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Enocoro / Stream cipher / Resynchronization attack / Linear cryptanalysis / Differential cryptanalysis / Truncated cryptanalysis / / |
Reference Info. |
IEICE Tech. Rep., vol. 107, no. 501, ISEC2007-147, pp. 7-13, Feb. 2008. |
Paper # |
ISEC2007-147 |
Date of Issue |
2008-02-22 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2007-50 ISEC2007-147 WBS2007-81 |
Conference Information |
Committee |
ISEC IT WBS |
Conference Date |
2008-02-28 - 2008-02-29 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2008-02-ISEC-IT-WBS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack |
Sub Title (in English) |
|
Keyword(1) |
Enocoro |
Keyword(2) |
Stream cipher |
Keyword(3) |
Resynchronization attack |
Keyword(4) |
Linear cryptanalysis |
Keyword(5) |
Differential cryptanalysis |
Keyword(6) |
Truncated cryptanalysis |
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kei Konosu |
1st Author's Affiliation |
Tokyo University of Science (TUS) |
2nd Author's Name |
Kenichiro Muto |
2nd Author's Affiliation |
Tokyo University of Science (TUS) |
3rd Author's Name |
Hiroki Furuichi |
3rd Author's Affiliation |
Tokyo University of Science (TUS) |
4th Author's Name |
Dai Watanabe |
4th Author's Affiliation |
Hitachi, Ltd. (Hitachi) |
5th Author's Name |
Toshinobu Kaneko |
5th Author's Affiliation |
Tokyo University of Science (TUS) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2008-02-29 08:55:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
IT2007-50, ISEC2007-147, WBS2007-81 |
Volume (vol) |
vol.107 |
Number (no) |
no.499(IT), no.501(ISEC), no.503(WBS) |
Page |
pp.7-13 |
#Pages |
7 |
Date of Issue |
2008-02-22 (IT, ISEC, WBS) |
|