A framework for chosen IV statistical analysis of stream ciphers

Englund, Hakan
Johansson, Thomas
Turan, Meltem Soenmez
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generalize this idea and propose a framework for chosen IV statistical attacks using a polynomial description. We propose a few new statistical attacks, apply them on some existing stream cipher proposals, and give some conclusions regarding the strength of their IV initialization. In particular, we experimentally detected statistical weaknesses in some state bits of Grain-128 with full IV initialization as well as in the keystream of Trivium using an initialization reduced to 736 rounds from 1152 rounds. We also propose some stronger alternative initialization schemes with respect to these statistical attacks.
8th Annual International Conference on Cryptology in India


A Novel Neural Network Method for Direction of Arrival Estimation with Uniform Cylindrical 12-Element Microstrip Patch Array
Caylar, Selcuk; Dural, Guelbin; Leblebicioğlu, Mehmet Kemal (2008-01-01)
In this study a new neural network algorithm is proposed for real time multiple source tracking problem with cylindrical patch antenna array based on a previous v reported Modified Neural Multiple Source Tracking Algorithm(MN-MUST). The proposed algorithm, namely Cylindrical Microstrip Patch Array Modified Neural Multiple Source Tracking Algorithm (CMN-MUST) implements W-MUST algorithm on a cylindrical microsttip patch array structure. CMN-MUST algorithm uses the advantage of directive pattern of microstrip...
A True random generator in FPGA for cryptographic applications
Yıldırım, Salih; Bazlamaçcı, Cüneyt Fehmi; Department of Electrical and Electronics Engineering (2012)
In this thesis a True Random Number Generator (TRNG) employed for cryptographic applications is investigated, implemented and evaluated. The design of TRNG and its embedded tests are described in VHDL language and then implemented on an FPGA platform. Randomness is extracted from the jitter of ring oscillators that has self-failure detecting and sampling logic. The implementation needs only primitive resources which are common in all kinds of FPGAs. The embedded randomness tests described in Federal Informa...
Soydan, Hilal; Koz, Alper; Düzgün, Hafize Şebnem; Alatan, Abdullah Aydın (2015-06-05)
Hyperspectral target detection methods have until now progressed mainly on two paths in remote sensing research. The first approach, anomaly detection methods, use the difference of a local region with respect to its neighborhood to analyze the image without using any prior information of the searched target. The second approach on the other hand uses a previously obtained signature of the target, which uniquely represents the target's characteristics with respect to the spectral wavelengths. The signature ...
A Meta-Heuristic Paradigm for solving the Forward Kinematics of 6-6 General Parallel Manipulator
Chandra, Rohitash; Frean, Marcus; Rolland, Luc (2009-12-18)
The forward kinematics of the general Gough platform, namely the 6-6 parallel manipulator is solved using hybrid meta-heuristic techniques in which the simulated annealing algorithm replaces the mutation operator in a genetic algorithm. The results are compared with the standard simulated annealing and genetic algorithm. It shows that the standard simulated annealing algorithm outperforms standard genetic algorithm in terms of computation time and overall accuracy of the solution on this problem. However, t...
A P2P based failure detection model for distributed systems
Kavuklu, Celal; Doğru, Ali Hikmet; Department of Computer Engineering (2006)
A comprehensive failure detection model is proposed to detect service failures in asynchronous distributed systems. The proposed model takes advantage of P2P technology to provide required functionality. When compared to similar studies in failure detection, the presented failure detection model is more autonomous in resolving service dependencies, embodies more flexibility in providing different failure detection functions (like unreliable failure detectors, membership services) and offers more security. A...
Citation Formats
H. Englund, T. Johansson, and M. S. Turan, “A framework for chosen IV statistical analysis of stream ciphers,” Chennai, INDIA, 2007, vol. 4859, p. 268, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/66378.