Lecture12 LFSR (Part-II)
Lecture12 LFSR (Part-II)
Modue3 - Lecture 5
Today’s Lecture
• Stream cipher
• LFSR
• Trivium
• Pseudorandom Functions
WEP (FMS Attack)
• Root key remains fixed for long period of time.
• IV has only 24-bits.
• IV is sent in plaintext.
• WPA uses 48 bit IV (2003)
• WPA2-PSK (Pre-Shared Key) (2004)
• WPA2-PSK [AES] is the recommended secure method.
• WPA3 (2018)
Linear Feedback Shift Register(LFSR)
Example: LFSR of Degree 3
LFSR of Degree m
LFSR
LFSR
• Above list shows one primitive polynomial for every value of m in the range from m = 2,3, . . . , 128
where notation (0,2,5) refers to the polynomial 1+x2 +x5.
LFSR: Known-Plaintext Attack
LFSR: Known-Plaintext Attack
Trivium: LFSR based Stream Cipher
Trivium: LFSR based Stream Cipher
Trivium: LFSR based Stream Cipher
Trivium: LFSR based Stream Cipher
• In the first phase, the cipher is clocked 4×288 = 1152 times. No cipher
output is generated (randomizes the cipher sufficiently and makes the
key stream dependent on both the key k and the IV).
• Starting with the output bit of cycle 1153, form the key stream.
• Trivium was submitted to the Profile II (hardware) of
the eSTREAM competition (2004 - 2008) by its authors, Christophe De
Cannière and Bart Preneel, and has been selected as part of the
portfolio for low area hardware ciphers.
• eSTREAM was organized by the European Network of Excellence in
Cryptography (ECRYPT).
Stream Cipher
Reading
Stream Cipher vs Block Cipher
Stream Cipher vs Block Cipher
Standards
Pseudorandom Function
Random Function
• Consider functions f: S → S
Random Function
• Consider functions f: S → S
• Let S= {0, 1}
• Then possible functions are:
Random Function
• Consider functions f: S → S
• Let S= {0, 1}
• Then possible functions are:
0 0 0 0 0 0 0 0
1 1 1 1 1 1 1 1
• A block cipher operates on a plaintext block of n bits to produce a ciphertext block of n bits. There are
2n possible different plaintext blocks and, for the encryption to be reversible each must produce a
unique ciphertext block. So if we limit ourselves to reversible mappings, the number of different
transformations is 2n!.
Block Ciphers
• Block ciphers are practical constructions of pseudorandom
permutations