Sciweavers

SACRYPT
2000
Springer

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security

13 years 8 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys. These attacks extend Biham's key collision attack and Hellman's time memory tradeoff attack, and can be applied to any additive stream cipher. We define linear redundancy to characterize the vulnerability of a plaintext source to these attacks. We show that an additive stream cipher with an n-bit key has an effective key size of n
David A. McGrew, Scott R. Fluhrer
Added 25 Aug 2010
Updated 25 Aug 2010
Type Conference
Year 2000
Where SACRYPT
Authors David A. McGrew, Scott R. Fluhrer
Comments (0)