Progress in Cryptology – AFRICACRYPT 2008
DOI: 10.1007/978-3-540-68164-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers

Abstract: Abstract. A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new methods for key recovery attacks. As an application, a key recovery attack on simplified versions of two eSTREAM Phase 3 candidates is given: For Grain-128 with IV initialization reduced to up to 180 of its 256 iterations, and for Trivium with IV initialization reduced to up to 672 of its 1152 iterations, it is experimentally demonstrated how to deduce a few key bits. Evid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
57
0
4

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(61 citation statements)
references
References 6 publications
0
57
0
4
Order By: Relevance
“…In the second part of our work we try to shed some light in this direction in a more systematic way. The recently proposed cube attack by Dinur and Shamir [4], which has a strong connection to [7] and the present work, also includes some systematic procedure to find weak public variable bits.…”
Section: Introductionmentioning
confidence: 91%
See 2 more Smart Citations
“…In the second part of our work we try to shed some light in this direction in a more systematic way. The recently proposed cube attack by Dinur and Shamir [4], which has a strong connection to [7] and the present work, also includes some systematic procedure to find weak public variable bits.…”
Section: Introductionmentioning
confidence: 91%
“…al. [7] developed a method to recover the key faster than by exhaustive search in case F does not properly mix its input bits. The idea is to first identify some bits from C referred to as weak public variable bits and then to consider the coefficient of a monomial involving these weak bits in the algebraic normal form of F .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach we use is similar to the one used in the attacks on the stream ciphers Trivium and Grain in [16]. However, while the results on Trivium and Grain were mostly obtained using simulations, our attack is based on theoretical analysis that combines algebraic and structural properties of Keccak in a novel way.…”
Section: Keystream Prediction For 9-round Keccakmentioning
confidence: 99%
“…However, while the results on Trivium and Grain were mostly obtained using simulations, our attack is based on theoretical analysis that combines algebraic and structural properties of Keccak in a novel way. This analysis enables us to estimate the complexity of the attack beyond the feasible region (in contrast to the simulation-based attack of [16]). …”
Section: Keystream Prediction For 9-round Keccakmentioning
confidence: 99%