Distinguishing Attack on a Modified Version of MAG Stream Cipher
عنوان مقاله: Distinguishing Attack on a Modified Version of MAG Stream Cipher
شناسه ملی مقاله: ISCC06_013
منتشر شده در ششمین کنفرانس بین المللی انجمن رمز ایران در سال 1388
شناسه ملی مقاله: ISCC06_013
منتشر شده در ششمین کنفرانس بین المللی انجمن رمز ایران در سال 1388
مشخصات نویسندگان مقاله:
Arash Mirzaei۱, - Cryptography & System Security Research Lab. (CSSRL)
Mohammad Dakhil Alian۲ - Cryptography & System Security Research Lab. (CSSRL)
Mahmoud Modarres Hashemi۳ - Cryptography & System Security Research Lab. (CSSRL)
خلاصه مقاله:
Arash Mirzaei۱, - Cryptography & System Security Research Lab. (CSSRL)
Mohammad Dakhil Alian۲ - Cryptography & System Security Research Lab. (CSSRL)
Mahmoud Modarres Hashemi۳ - Cryptography & System Security Research Lab. (CSSRL)
MAG is a synchronous stream cipher designed by Vuckovac submitted to the eSTREAM project.Vuckovac also proposed two modified versions of MAG to avoid the distinguishing attack on the first version of MAG presented by Fischer. In this paper we show that, changing the Fischer’s attack we can apply it to one of the modified versions of MAG. The modified attack requires only 514 successive bytes of known keystream and 5 xor and 2 comparison operations between 16 bit words. In addition, we show that distinguishing and key recovery attack proposed by Simpson and Henricksen on all versions of MAG is feasible just by considering an assumption on initialization of MAG that simplifies this step so much. Therefore, their attack cannot be performed in general.
کلمات کلیدی: Cryptanalysis, MAG Stream Cipher, Distinguishing Attack, Estream
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/96859/