Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
2008 (English)In: PROGRESS IN CRYPTOLOGY: AFRICACRYPT 2008 , 2008, 236-245 p.Conference paper (Refereed)
A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new methods for key recovery attacks. As an application, a key recovery attack on simplified versions of two eSTREAM Phase 3 candidates is given: For Grain-128 with IV initialization reduced to up to 180 of its 256 iterations, and for Trivium with IV initialization reduced to up to 672 of its 1152 iterations, it is experimentally demonstrated how to deduce a few key bits. Evidence is given that the present analysis is not applicable on Grain-128 or Trivium with full IV initialization.
Place, publisher, year, edition, pages
2008. 236-245 p.
, LECTURE NOTES IN COMPUTER SCIENCE, ISSN 0302-9743 ; 5023
Stream ciphers, Chosen IV analysis, eSTREAM, Grain, Trivium
IdentifiersURN: urn:nbn:se:kth:diva-70269DOI: 10.1007/978-3-540-68164-9_16ISI: 000256541200016OAI: oai:DiVA.org:kth-70269DiVA: diva2:486157
1st International Conference on Cryptology in Africa, Casablanca, MOROCCO, JUN 11-14, 2008
QC 201202032012-01-302012-01-302012-02-03Bibliographically approved