2020
DOI: 10.48084/etasr.3250
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a Statistical Testing Framework for a Lightweight Stream Cipher

Abstract: The Shrinking Generator (SG) is a popular synchronous, lightweight stream cipher that uses minimal computing power. However, its strengths and weaknesses have not been studied in detail. This paper proposes a statistical testing framework to assess attacks on the SG. The framework consists of a d-monomial test that is adapted to SG by applying the algebraic normal form (ANF) representation of Boolean functions, a test that uses the maximal degree monomial test to determine whether the ANF follows the proper mi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…However, this approach has the limitation of omitting the evaluation of other essential elements in determining the security of a stream cipher. One of these factors is the statistical independence between the internal state (comprising all the variables that determine the operation of the PRNG, including the input) of the cipher and its outputs [29]. Their determination is essential to avoid powerful cryptographic attacks such as the correlation attack [30,31], the differential attack [32], or the attack on neutral bits [33].…”
Section: Introductionmentioning
confidence: 99%
“…However, this approach has the limitation of omitting the evaluation of other essential elements in determining the security of a stream cipher. One of these factors is the statistical independence between the internal state (comprising all the variables that determine the operation of the PRNG, including the input) of the cipher and its outputs [29]. Their determination is essential to avoid powerful cryptographic attacks such as the correlation attack [30,31], the differential attack [32], or the attack on neutral bits [33].…”
Section: Introductionmentioning
confidence: 99%