Abstract
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a result; the second shows artifacts where the same inputs are presented to the key-dependent S-boxes in the final stage of the cipher for two successive outputs. Both distinguishers are demonstrated with experiments on a reduced variant of the cipher.
This research was supported by convergence integrated media GmbH
This research was supported by Deutsche Forschungsgemeinschaft (DFG) grant Kr 1521/2
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. Journal of the ACM, 33(4):792–807, 1986.
IP security protocol (ipsec). http://www.ietf.org/html.charters/ipsec-charter.html.
Helger Lipmaa, Philip Rogaway, and David Wagner. Comments to NIST concerning AES modes of operation: CTR-mode encryption, 2000.
David A. McGrew. Re: Possible problems with leviathan? Personal email, November 2000.
David A. McGrew and Scott R. Fluhrer. The stream cipher LEVIATHAN. NESSIE project submission, October 2000.
NESSIE: New European schemes for signatures, integrity, and encryption. http://www.cryptonessie.org/.
Phillip Rogaway and Don Coppersmith. A software-optimized encryption algorithm. In Ross Anderson, editor, Fast Software Encryption, pages 56–63. Springer-Verlag, 1994.
Paul C. van Oorschot and Michael J. Wiener. Parallel collision search with cryptanalytic applications. Journal of Cryptology, 12(1):1–28, 1999.
David Wheeler. A bulk data encryption algorithm. In Bart Preneel, editor, Fast Software Encryption: Second International Workshop, volume 1008 of Lecture Notes in Computer Science, Leuven, Belgium, 14–16 December 1994. Springer-Verlag. Published 1995. URL for this paper: http://www.ciphergoth.org/crypto/leviathan
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Crowley, P., Lucks, S. (2002). Bias in the LEVIATHAN Stream Cipher. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_18
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive