How to construct random functions
Journal of the ACM (JACM)
Principles and practice of information theory
Principles and practice of information theory
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
x2 Cryptanalysis of the SEAL Encryption Algorithm
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Scream: A Software-Efficient Stream Cipher
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
A New Keystream Generator MUGI
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
We present an attack on the SEAL Pseudorandom Function Family that is able to efficiently distinguish it from a truly random function with 243 bytes output. While this is not a practical attack on any use of SEAL, it does demonstrate that SEAL does not achieve its design goals.