Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security

  • Authors:
  • David A. McGrew;Scott R. Fluhrer

  • Affiliations:
  • -;-

  • Venue:
  • SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
  • Year:
  • 2000

Quantified Score

Hi-index 0.01

Visualization

Abstract

We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys. These attacks extend Biham's key collision attack and Hellman's time memory tradeoff attack, and can be applied to any additive stream cipher. We define linear redundancy to characterize the vulnerability of a plaintext source to these attacks. We show that an additive stream cipher with an n-bit key has an effective key size of n-min(l, lgM) against the key collision attack, and of 2n/3+ lg(n/3) + max(n - l, 0) against the time memory tradeoff attack, when the the attacker knows l linear equations over the plaintext and has M ciphertexts encrypted with M distinct unknown secret keys. Lastly, we analyze the IP, TCP, and UDP protocols and some typical protocol constructs, and show that they contain significant linear redundancy. We conclude with observations on the use of stream ciphers for Internet security.