Key-dependent Security of Stream Ciphers

01/02/2020
by   Eric Filiol, et al.
0

The control of the cryptography is more than ever a recurrent issue. As the current international regulation does not apply in the signatory countries, the concept of enforcing backdoors in encryption system is reborn with more strength. This paper deals with a particular class of stream cipher backdoors. This class, under a different form, has been widely used by the industry in the 80s and 90s in the context of the export control rules imposed by the US to the Western countries. We propose here a new system – called BSEA-2, with a 128-bit secret key – which is a seemingly minor modification of BSEA-1, a system proposed in <cit.>. BSEA-2 illustrates, in a simple and didactic — it has been also designed for a MSc cryptanalysis course — but efficient way the concept of key-dependent cryptographic security. The aim is to keep control on encryption means that a country/provider could provide to another country/client for which the secret key are also provided. With such systems, changing the key class results in downgrading the cryptographic security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/26/2019

BSEA-1 - A Stream Cipher Backdooring Technique

Recent years have shown that more than ever governments and intelligence...
research
02/28/2023

Revocable Cryptography from Learning with Errors

Quantum cryptography leverages many unique features of quantum informati...
research
04/30/2020

A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

The study of sending and receiving secret messages is called cryptograph...
research
10/22/2018

Cryptographic analysis of the Modified Matrix Modular Cryptosystem

We show that the Modified Matrix Modular Cryptosystem proposed by S.K. R...
research
11/27/2020

An authenticated and secure accounting system for international emissions trading

Expanding multi-country emissions trading system is considered as crucia...
research
05/01/2019

A Comparative Analysis of the Cyber Security Strategy of Bangladesh

Technology is an endless evolving expression in modern era, which increa...
research
07/27/2019

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

There can be performance and vulnerability concerns with block ciphers, ...

Please sign up or login with your details

Forgot password? Click here to reset