Algebraic analysis of the SSS stream cipher

  • Authors:
  • Mufeed Juma ALMashrafi;Kenneth Koon-Ho Wong;Leonie Simpson;Harry Bartlett;Ed Dawson

  • Affiliations:
  • Information Security Institute, Brisbane, Australia;Information Security Institute, Brisbane, Australia;Queensland University of Technology, Brisbane, Australia;Queensland University of Technology, Brisbane, Australia;Information Security Institute, Brisbane, Australia

  • Venue:
  • Proceedings of the 4th international conference on Security of information and networks
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the keydependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well-chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.