Preventing weaknesses on F-FCSR in IV mode and tradeoff attack on F-FCSR 8
暂无分享,去创建一个
E. Jaulmes and F. Muller have described some attacks on F-FCSR-8 and F-FCSR-H algorithms [1]. These attacks pointed out three weaknesses on the algorithms. The first one is a bottleneck effect due to a big mistake in our design. This can be repaired by only removing one line of code in the F-FCSR-8 algorithm. The second weakness lies in the diffusion of the IV which is not good for both algorithms, due to a too simple Key+IV–setup procedure. The last weakness is that F-FCSR-8 is vulnerable to a TMD-tradeoff attack, using the fact that the number of possible values of each subfilter is relatively small. In this paper, we repair all the weaknesses that were pointed out. We propose a better Key+IV–setup procedure to suppress the bottleneck and have a good diffusion of the IV. To thwart the TMD tradeoff attack on F-FCSR-8, we had to increase the size of the main register up to 256 bits. But we can now extract two pseudorandom bytes at each transition of the automaton instead of one, so the performances remain at least as good as before. 1 Repairing F-FCSR-H : a better Key+IV–setup procedure As in the original version, we put the key and IV bits in the main register, but we then collect the first twenty bytes output by the automaton and feed them back to the main register. Then we wait enough transitions of the automaton, similarly as in the original version, before using the pseudorandom stream. Description of the new procedure ”Key+IV Setup” Inputs a key K of length k = 80 and an IV of length v ≤ 80. 1. The main register M is initialized with the key and the IV: M := K + 2 · IV = (080−v‖IV‖K). 2. The carries register is initialized to 0 : C := 0 = (0).