中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Subject: Computer Science
Title:
on guess and determine analysis of rabbit
Author: Feng Xiutao ; Shi Zhenqing ; Wu Chuankun ; Feng Dengguo
Keyword: Stream cipher ; rabbit ; guess and determine attack
Source: INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
Issued Date: 2011
Volume: 22, Issue:6, Pages:1283-1296
Indexed Type: SCI
Department: Feng Xiutao; Shi Zhenqing; Wu Chuankun; Feng Dengguo Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100190 Peoples R China.
Sponsorship: Natural Science Foundation of China60833008, 60902024; National 973 Program2007CB807902
Abstract: Rabbit is a stream cipher proposed by M. Boesgaard et al., and has been selected into the final portfolio after three evaluation phases of the ECRYPT Stream Cipher Project (eSTREAM). So far only a few papers studied its security besides a series of white papers by the designers of Rabbit. Recently we presented a new idea to evaluate the security of a word-oriented stream cipher algorithm from a smaller data granularity instead of its original data granularity and applied it successfully to the stream cipher SOSEMANUK. In this work we apply the same idea to the Rabbit algorithm and analyze its security in resistance against the guess and determine attack from the view point of byte units. As a result, we present two new approaches of solving all x(j,t)+1's and g(j,t)'s from the next-state function and the extraction scheme of Rabbit, whose complexities are 2(166) and 2(140.68) respectively, which are dramatically lower than those proposed by Lu et al. (2(192) and 2(174) resp.) at ISC 2008. Finally based on the above new results we propose a byte-based guess and determine attack on Rabbit, which only needs a small segment of known key stream to recover the whole internal state of Rabbit with time complexity 2(242). Though the complexity of our attack is far higher than that of a brute force (2(128)), we believe that some new techniques adopted in this paper are of interest for future work on Rabbit.
English Abstract: Rabbit is a stream cipher proposed by M. Boesgaard et al., and has been selected into the final portfolio after three evaluation phases of the ECRYPT Stream Cipher Project (eSTREAM). So far only a few papers studied its security besides a series of white papers by the designers of Rabbit. Recently we presented a new idea to evaluate the security of a word-oriented stream cipher algorithm from a smaller data granularity instead of its original data granularity and applied it successfully to the stream cipher SOSEMANUK. In this work we apply the same idea to the Rabbit algorithm and analyze its security in resistance against the guess and determine attack from the view point of byte units. As a result, we present two new approaches of solving all x(j,t)+1's and g(j,t)'s from the next-state function and the extraction scheme of Rabbit, whose complexities are 2(166) and 2(140.68) respectively, which are dramatically lower than those proposed by Lu et al. (2(192) and 2(174) resp.) at ISC 2008. Finally based on the above new results we propose a byte-based guess and determine attack on Rabbit, which only needs a small segment of known key stream to recover the whole internal state of Rabbit with time complexity 2(242). Though the complexity of our attack is far higher than that of a brute force (2(128)), we believe that some new techniques adopted in this paper are of interest for future work on Rabbit.
Language: 英语
WOS ID: WOS:000294809400005
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/16075
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Feng Xiutao,Shi Zhenqing,Wu Chuankun,et al. on guess and determine analysis of rabbit[J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE,2011-01-01,22(6):1283-1296.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Feng Xiutao]'s Articles
[Shi Zhenqing]'s Articles
[Wu Chuankun]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Feng Xiutao]‘s Articles
[Shi Zhenqing]‘s Articles
[Wu Chuankun]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace