{"title":"关于轻量级流密码Fountain v1 & Lizard的一些结果","authors":"Ravi Anand, Dibyendu Roy, Santanu Sarkar","doi":"10.3934/amc.2020128","DOIUrl":null,"url":null,"abstract":"In this paper, we propose cryptanalytic results on two lightweight stream ciphers: Fountain v1 and Lizard. The main results of this paper are the followings: \\begin{document}$ - $\\end{document} We propose a zero-sum distinguisher on reduced round Fountain v1. In this context, we study the non-randomness of the cipher with a careful selection of cube variables. Our obtained cube provides a zero-sum on Fountain v1 till \\begin{document}$ 188 $\\end{document} initialization rounds and significant non-randomness till \\begin{document}$ 189 $\\end{document} rounds. This results in a distinguishing attack on Fountain v1 with \\begin{document}$ 189 $\\end{document} initialization rounds. \\begin{document}$ - $\\end{document} Further, we find that the same cipher has a weakness against conditional Time-Memory-Data-Tradeoff (TMDTO). We show that TMDTO attack using sampling resistance has online complexity \\begin{document}$ 2^{110} $\\end{document} and offline complexity \\begin{document}$ 2^{146} $\\end{document} . \\begin{document}$ - $\\end{document} Finally, we revisit the Time-Memory-Data-Tradeoff attack on Lizard by Maitra et al. (IEEE Transactions on Computers, 2018) and provide our observations on their work. We show that instead of choosing any random string, some particular strings would provide better results in their proposed attack technique.","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some results on lightweight stream ciphers Fountain v1 & Lizard\",\"authors\":\"Ravi Anand, Dibyendu Roy, Santanu Sarkar\",\"doi\":\"10.3934/amc.2020128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose cryptanalytic results on two lightweight stream ciphers: Fountain v1 and Lizard. The main results of this paper are the followings: \\\\begin{document}$ - $\\\\end{document} We propose a zero-sum distinguisher on reduced round Fountain v1. In this context, we study the non-randomness of the cipher with a careful selection of cube variables. Our obtained cube provides a zero-sum on Fountain v1 till \\\\begin{document}$ 188 $\\\\end{document} initialization rounds and significant non-randomness till \\\\begin{document}$ 189 $\\\\end{document} rounds. This results in a distinguishing attack on Fountain v1 with \\\\begin{document}$ 189 $\\\\end{document} initialization rounds. \\\\begin{document}$ - $\\\\end{document} Further, we find that the same cipher has a weakness against conditional Time-Memory-Data-Tradeoff (TMDTO). We show that TMDTO attack using sampling resistance has online complexity \\\\begin{document}$ 2^{110} $\\\\end{document} and offline complexity \\\\begin{document}$ 2^{146} $\\\\end{document} . \\\\begin{document}$ - $\\\\end{document} Finally, we revisit the Time-Memory-Data-Tradeoff attack on Lizard by Maitra et al. (IEEE Transactions on Computers, 2018) and provide our observations on their work. We show that instead of choosing any random string, some particular strings would provide better results in their proposed attack technique.\",\"PeriodicalId\":50859,\"journal\":{\"name\":\"Advances in Mathematics of Communications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Mathematics of Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.3934/amc.2020128\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Mathematics of Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.3934/amc.2020128","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
摘要
In this paper, we propose cryptanalytic results on two lightweight stream ciphers: Fountain v1 and Lizard. The main results of this paper are the followings: \begin{document}$ - $\end{document} We propose a zero-sum distinguisher on reduced round Fountain v1. In this context, we study the non-randomness of the cipher with a careful selection of cube variables. Our obtained cube provides a zero-sum on Fountain v1 till \begin{document}$ 188 $\end{document} initialization rounds and significant non-randomness till \begin{document}$ 189 $\end{document} rounds. This results in a distinguishing attack on Fountain v1 with \begin{document}$ 189 $\end{document} initialization rounds. \begin{document}$ - $\end{document} Further, we find that the same cipher has a weakness against conditional Time-Memory-Data-Tradeoff (TMDTO). We show that TMDTO attack using sampling resistance has online complexity \begin{document}$ 2^{110} $\end{document} and offline complexity \begin{document}$ 2^{146} $\end{document} . \begin{document}$ - $\end{document} Finally, we revisit the Time-Memory-Data-Tradeoff attack on Lizard by Maitra et al. (IEEE Transactions on Computers, 2018) and provide our observations on their work. We show that instead of choosing any random string, some particular strings would provide better results in their proposed attack technique.
Some results on lightweight stream ciphers Fountain v1 & Lizard
In this paper, we propose cryptanalytic results on two lightweight stream ciphers: Fountain v1 and Lizard. The main results of this paper are the followings: \begin{document}$ - $\end{document} We propose a zero-sum distinguisher on reduced round Fountain v1. In this context, we study the non-randomness of the cipher with a careful selection of cube variables. Our obtained cube provides a zero-sum on Fountain v1 till \begin{document}$ 188 $\end{document} initialization rounds and significant non-randomness till \begin{document}$ 189 $\end{document} rounds. This results in a distinguishing attack on Fountain v1 with \begin{document}$ 189 $\end{document} initialization rounds. \begin{document}$ - $\end{document} Further, we find that the same cipher has a weakness against conditional Time-Memory-Data-Tradeoff (TMDTO). We show that TMDTO attack using sampling resistance has online complexity \begin{document}$ 2^{110} $\end{document} and offline complexity \begin{document}$ 2^{146} $\end{document} . \begin{document}$ - $\end{document} Finally, we revisit the Time-Memory-Data-Tradeoff attack on Lizard by Maitra et al. (IEEE Transactions on Computers, 2018) and provide our observations on their work. We show that instead of choosing any random string, some particular strings would provide better results in their proposed attack technique.
期刊介绍:
Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.
Areas covered include coding theory, cryptology, combinatorics, finite geometry, algebra and number theory, but are not restricted to these. This journal also aims to cover the algorithmic and computational aspects of these disciplines. Hence, all mathematics and computer science contributions of appropriate depth and relevance to the above mentioned applications in communications technology are welcome.
More detailed indication of the journal''s scope is given by the subject interests of the members of the board of editors.