Evaluation of SOSEMANUK with regard to guess-and-determine attacks
2006 (English)Conference paper (Refereed)
This paper describes the attack on SOSEMANUK, one of the stream ciphers proposed at eSTREAM (the ECRYPT Stream Ci-pher Project) in 2005. The cipher features the variable secret key length from 128-bit up to 256-bit and 128-bit initial vector. The basic operation of the cipher is performed in a unit of 32 bits i.e. \word", and each word generates keystream. This paper shows the result of guess-and-determine attack made on SOSEMANUK. The attack method enables to determine all of 384-bit internal state just after the initialization, using only 2 4 -word keystream. This attack needs about 2224 computations. Thus, when secret key length is longer than 224-bit, it needs less computational e®ort than an exhaustive key search, to break SOSEMANUK. The results show that the cipher has still the 128-bit security as claimed by its designers.
Place, publisher, year, edition, pages
2006. 25-34 p.
SOSEMANUK, ECRYPT, eSTREAM, stream cipher, pseudo-random number generator, guess-and-determine attack
IdentifiersURN: urn:nbn:se:kth:diva-71062OAI: oai:DiVA.org:kth-71062DiVA: diva2:486487
In State of Art of Stream Ciphers (SASC’06)