BSEA-1 - A Stream Cipher Backdooring Technique

03/26/2019
by   Eric Filiol, et al.
0

Recent years have shown that more than ever governments and intelligence agencies try to control and bypass the cryptographic means used for the protection of data. Backdooring encryption algorithms is considered as the best way to enforce cryptographic control. Implementation backdoors (at the protocol/implementation/management level) are generally considered. In this paper we propose to address the most critical issue of backdoors: mathematical backdoors or by-design backdoors, which are put directly at the mathematical design of the encryption algorithm. Considering a particular family (among all the possible ones) of backdoors, we present BSEA-1, a stream cipher algorithm which contains a design backdoor enabling an effective cryptanalysis. The BSEA-1 algorithm uses a 120-bit key. The exploitation of the backdoor enables to break the cipher with around 2 Kbits of knowplaintext in a few seconds.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/26/2021

VLSI Implementation of Cryptographic Algorithms Techniques: A Literature Review

Through the years, the flow of Data and its transmission have increased ...
research
01/02/2020

Key-dependent Security of Stream Ciphers

The control of the cryptography is more than ever a recurrent issue. As ...
research
07/01/2018

Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

Full Disk Encryption (FDE) has become a widely used security feature. Al...
research
08/13/2023

A Zero-Knowledge Revocable Credential Verification Protocol Using Attribute-Based Encryption

We introduce a zero-knowledge credential verification protocol leveragin...
research
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...
research
11/09/2021

AEAD Modes for ZUC Family Stream Ciphers

In order to improve the efficiency of using ZUC primitives, we give two ...
research
02/09/2019

A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope

Today, the protection of information, ensuring of the safety and the rec...

Please sign up or login with your details

Forgot password? Click here to reset