<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-018-12-1741</article-id>
      <article-id pub-id-type="publisher-id">23721</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>D.4.6 - Security and Protection</subject>
          <subject>E.3 - DATA ENCRYPTION</subject>
          <subject>K.6.5 - Security and Protection</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>New Results of Related-key Attacks on All Py-Family of Stream Ciphers</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Ding</surname>
            <given-names>Lin</given-names>
          </name>
          <email xlink:type="simple">lin_ding@fake_email.com</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Guan</surname>
            <given-names>Jie</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Wen-long</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Information Science and Technology Institute, Zhengzhou, China</addr-line>
        <institution>Information Science and Technology Institute</institution>
        <addr-line content-type="city">Zhengzhou</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Lin Ding (<email xlink:type="simple">lin_ding@fake_email.com</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2012</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>06</month>
        <year>2012</year>
      </pub-date>
      <volume>18</volume>
      <issue>12</issue>
      <fpage>1741</fpage>
      <lpage>1756</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/C0CC6CDE-2FBF-528D-B9AD-59D80FE192BD">C0CC6CDE-2FBF-528D-B9AD-59D80FE192BD</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/5505823">5505823</uri>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>09</month>
          <year>2011</year>
        </date>
        <date date-type="accepted">
          <day>15</day>
          <month>02</month>
          <year>2012</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Lin Ding, Jie Guan, Wen-long Sun</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family of stream ciphers. At Indocrypt 2007, Sekar, Paul and Preneel showed related-key weaknesses in the Py-family of stream ciphers including the strongest member TPypy. Furthermore, they modified the stream ciphers TPypy and TPy to generate two fast ciphers, namely RCR-32 and RCR-64, in an attempt to rule out all the attacks against the Py-family of stream ciphers. So far there exists no attack on RCR-32 and RCR-64. In this paper, we show that the related-key weaknesses can be still used to construct related-key distinguishing attacks on all Py-family of stream ciphers including the modified versions RCR-32 and RCR-64. Under related keys, we show distinguishing attacks on RCR-32 and RCR-64 with data complexity 2139.3 and advantage greater than 0.5. We also show that the data complexity of the distinguishing attacks on Py-family of stream ciphers proposed by Sekar et al. can be reduced fromto. These results constitute the best attacks on the strongest members of the Py-family of stream ciphers Tpypy, RCR-32 and RCR-64. By modifying the key setup algorithm, we propose two new stream ciphers TRCR-32 and TRCR-64 which are derived from RCR-32 and RCR-64 respectively. Based on our security analysis, we conjecture that no attacks lower than brute force are possible on TRCR-32 and TRCR-64 stream ciphers.</p>
      </abstract>
    </article-meta>
  </front>
</article>
