introduction to clock_controlled stream cipher system sayed mahdi mohammad hasanzadeh...

18
Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh [email protected] Zaeim Electronics industries 1380

Upload: matthew-lamb

Post on 17-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Introduction to CLOCK_CONTROLLED STREAM

CIPHER SYSTEM

Sayed Mahdi Mohammad Hasanzadeh

[email protected]

Zaeim Electronics industries

1380

Page 2: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Contents:

• Introduction to Clock_Controlled Stream Cipher Systems

• Former important attacks

• Conclusion

Page 3: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Introduction to Clock_Controlled stream cipher systems

• In A5 algorithm used from clock-controlled

• LFSR a tool for stream cipher designing

• Introduction Clock_controlled system

• A simple Clock_controlled system

• Types of Clock_controlled systems

• A statistical Model for any Clock_controlled system

Page 4: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

LFSR is used in stream cipher systems

• High period (2^L-1)• Satisfied Golomb criteria • Easy for implementation • Low complexity

Page 5: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Introduction Clock_controlled system

Page 6: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

A simple Clock_controlled system

CR

SR

Page 7: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

types of Clock_controlled system

• Stop/go clock_controlled

• Step1/step2 clock_controlled

• Step[D,K] clock_controlled

• Cascade clock_controlled– Cycle cascade clock_controlled– M-sequence clock_controlled– Multibit clock_controlled

Page 8: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Cascade clock_controlled

Page 9: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Statistical Model for any Clock_controlled system

n

kkn nSau

0

0),(

Page 10: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Former important attacks

• Exhaustive search

• Divided and conquer attack

• Correlation attack

• Analyzing previous works

Page 11: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Exhaustive search

n

i

Li

1

)12(

Page 12: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Divided and conquer attack

• Each stage is independent with another stage

• Analyzing each stage with an arbitrary attack only

– Correlation attack with :

• levenshtein distance

• novel distance

n

i

Li

1

)12(

Page 13: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Correlation attack

In this attack we search all initial states to find which state generates minimum distance .

• Levenshtein Distance• Novel Distance

Page 14: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Levenshtein Distance

• Levenshtein distance for non equal–length sequence comparison

• One sequence is obtained from the other by symbol substitution, deletion, and insertion

The levenshtein distance defined as the minimum edit operations required to transform one sequence into the other.

Page 15: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Clock_controlled

Page 16: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Cycle cascade clock_controlled

Page 17: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Analyzing previous works

• Complexity in exhaustive search increases exponential with LFSR length

• In Divided & conquer attack:

• Are stages independed really?

• We don’t use dependence between output bits.

Page 18: Introduction to CLOCK_CONTROLLED STREAM CIPHER SYSTEM Sayed Mahdi Mohammad Hasanzadeh Hasanzadeh@Raymandcrypto.ir Zaeim Electronics industries 1380

Conclusions • Introduced Clock-Controlled Stream Cipher

• This type of stream cipher has good properties

• Introduced Former important attacks– Complexity in exhaustive search increases exponential

with LFSR length – In Divided & conquer attack:

• Are stages independed really?

• We don’t use dependence between output bits.

• This type of stream cipher has weakness

• For using of this type of stream cipher should be careful and combine it with other elements