Abstract
Self-synchronous encryption can provide private communications across channels that are prone to bit-slip (insertion/deletion) errors. Under these conditions, conventional synchronous stream ciphers suffer catastrophic message loss, whereas self-synchronous ciphers (SSCs) automatically re-synchronise after a short error burst, with no additional circuitry or protocols. In this paper we point out some security problems of SSCs which are unavoidable, basically due to the fact that all of their input is sliding ciphertext, which may be chosen by a cryptanalyst. Although apparently similar in structure to nonlinear filter generator stream ciphers, self-synchronous ciphers are subject to quite different cryptanalytic attacks, which we briefly describe. Finally, we present a new class of designs for SSCs which are intended to resist sliding input attacks by maintaining a uniform distribution of internal data values in the feedback stage and subsequently.
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption, 1994 Leuven Workshop, LNCS, volume 1008, pages 137–143. Springer-Verlag, 1994.
R.J. Anderson. Tree Functions and Cipher Systems. Cryptologia, 15(3): 194–202, July 1991.
J. Daemen. Cipher and Hash Function Design. PhD thesis, Catholic University of Leuven, 1995.
H. Feistel, W. Notz, and J. Smith. Some Cryptographic Techniques for Machine-to-Machine Data Communications. Proceedings of the IEEE, 63(11):1545–1554, November 1975.
H. Fredricksen. The Number of Nonlinear Shift Registers That Produce All Vectors of Weight ≤; t. IEEE Transactions on Information Theory, 39(6):1989–1990, November 1993.
J.Dj. Golic. On Security of Nonlinear Filter Generators. In Fast Software Encryption, 1996 Cambridge Workshop, LNCS, volume 1039, pages 173–188. Springer-Verlag, 1995.
J.Dj. Golic. Fast Low Order Approximation of Cryptographic Functions. In Advances in Cryptology — Eurocrypt '96, Proceedings, LNCS, volume 1070, pages 268–282. Springer-Verlag, 1996.
S.W. Golomb, R.E. Peile, and H. Taylor. Nonlinear Shift Registers that Produce All Vectors of Weight ≤; t. IEEE Transactions on Information Theory, 38(3):1181–1183, May 1992.
J.B. Kam and G.I. Davida. Structured Design of Substitution-Permutation Encryption Networks. IEEE Transactions on Computers, 28(10):747–753, October 1979.
L. Knudsen. Truncated and Higher Order Differentials. In Fast Software Encryption, 1994 Leuven Workshop, LNCS, volume 1008, pages 196–211. Springer-Verlag, 1994.
S. Lee, S. Chee, S. Park, and S. Park. Conditional Correlation Attack on Nonlinear Filter Generators. In Advances in Cryptology — Asiacrypt '96, Proceedings, LNCS, volume 1163, pages 360–367. Springer-Verlag, 1996.
J.L. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory, 15(1):122–127, January 1969.
M. Matsui. Linear Cryptanalysis Method for DES Cipher. In Advances in Cryptology — Eurocrypt '93, Proceedings, LNCS, volume 765, pages 386–397. Springer-Verlag, 1993.
U.M. Maurer. New Approaches to the Design of Self-Synchronizing Stream Ciphers. In Advances in Cryptology — Eurocrypt '91, Proceedings, LNCS, volume 547, pages 458–471. Springer-Verlag, 1991.
W. Millan. Low Order Approximation of Cipher Functions. In Cryptology: Policy and Algorithms Conference, Proceedings, LNCS, volume 1029, pages 144–155. Springer-Verlag, 1995.
O.S. Rothaus. On Bent Functions. Journal of Combinatorial Theory (A), 20:300–305, 1976.
J.E. Savage. Some Simple Self-Synchronizing Digital Data Scramblers. The Bell System Technical Journal, pages 449–487, February 1967.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Millan, W., Dawson, E. (1997). On the security of self-synchronous ciphers. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027923
Download citation
DOI: https://doi.org/10.1007/BFb0027923
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive