A Distinguish Attack on COSvd Cipher

The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-boxes don-t select uniformly. We use this property for an Improve distinguish attack.





References:
[1] E. Filiol, C. Fontaine, S. Josse. The COSvd Ciphers, SASC: the State of
the Art of Stream Ciphers, NoE ECRYPT Workshop, 2004.
[2] E. Filiol, C. Fontaine. A new Ultrafast Stream Ciphers Design: COS
Ciphers , Proceedings of the 8th IMA Conference on Cryptography and
Coding, Lecture Notes in Computer Science 2260, pp. 85-98, Springer
Verlag, 2001.
[3] H. Wu and F. Bao, Cryptanalysis of stream cipher COS (2, 128) mode I.
In Australian Conference on Information Security and Privacy, ACISP
2002, number 2384 in Lecture Notes in Computer Science, pages 154-
158. Springer-Verlag, 2002.
[4] S. Babbage, The COS Stream Ciphers are Extremely Weak,
http://eprint.iacr.org/2001/078
[5] http://www_rocq.inria.fr/codes/Eric.Filiol/English/COS/COS.html
[6] A.P. Fontana, On a proposed symbolic dynamics for the Henon map,
Thesis, Naval postgraduate school, June 1993.
[7] M. Henon, A two-dimensional mapping with a strange attractor.
Communications in Mathematical Physics, 1976, vol. 50, pages 69-77.
[8] D. Erdmann, S. Murphy Henon, Stream Cipher, Electronic Letters, vol.
28, no 9, pages 893-895, 1992.
[9] P. Ekdahl, On LFSR based Stream Ciphers Analysis and Design. Phd
Thesis, Lund University, 2003.
[10] T. Cover, J.A. Thomas, Elements of information theory, Wiley series in
Telecommunication, Wiley, 1991.