2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2008
DOI: 10.1109/iih-msp.2008.198
|View full text |Cite
|
Sign up to set email alerts
|

Distinguishing Attack on SN3 Stream Cipher

Abstract: SN3 is a synchronous stream cipher uses keys up to 768-byte. The cipher is constructed as an array base generator in which each key stream word can be considered as a linear combination of some array contents. While the cipher has not been analyzed yet, we show that there is a significance correlation between output key streams and by using this result we mount a distinguishing attack on SN3 stream cipher with having about 2 28.2 words of the output sequence.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
6
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…In this appendix we examine the attacks on sn3 and mv3 presented in [14] and [15], respectively, and show that their correct data complexities are 2 …”
Section: A Appendixmentioning
confidence: 99%
See 3 more Smart Citations
“…In this appendix we examine the attacks on sn3 and mv3 presented in [14] and [15], respectively, and show that their correct data complexities are 2 …”
Section: A Appendixmentioning
confidence: 99%
“…The security claim made in [9] is that no attack on the cipher should be faster than exhaustive key search for 256-bit keys. As mentioned in the 2 We note that another distinguishing attack on sn3 was presented in [14]. The attack uses part of the observations used in our attack, along with different techniques.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, according to the declaration of the designers, COSvd(2,128) was adopted by at least one commercial standard (the core algorithm in file system encryption software TURENEE). So far, there is only one literature [6] …”
mentioning
confidence: 99%