Change search
ReferencesLink to record
Permanent link

Direct link
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
FHNW, Switzerland.
EPFL, Switzerland.
FHNW, Switzerland.
2008 (English)In: PROGRESS IN CRYPTOLOGY: AFRICACRYPT 2008  , 2008, 236-245 p.Conference paper (Refereed)
Abstract [en]

A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new methods for key recovery attacks. As an application, a key recovery attack on simplified versions of two eSTREAM Phase 3 candidates is given: For Grain-128 with IV initialization reduced to up to 180 of its 256 iterations, and for Trivium with IV initialization reduced to up to 672 of its 1152 iterations, it is experimentally demonstrated how to deduce a few key bits. Evidence is given that the present analysis is not applicable on Grain-128 or Trivium with full IV initialization.

Place, publisher, year, edition, pages
2008. 236-245 p.
Keyword [en]
Stream ciphers, Chosen IV analysis, eSTREAM, Grain, Trivium
National Category
Computer Science
URN: urn:nbn:se:kth:diva-70269DOI: 10.1007/978-3-540-68164-9_16ISI: 000256541200016OAI: diva2:486157
1st International Conference on Cryptology in Africa, Casablanca, MOROCCO, JUN 11-14, 2008
QC 20120203Available from: 2012-01-30 Created: 2012-01-30 Last updated: 2012-02-03Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Khazaei, Shahram
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 20 hits
ReferencesLink to record
Permanent link

Direct link