Change search
ReferencesLink to record
Permanent link

Direct link
Evaluation of SOSEMANUK with regard to guess-and-determine attacks
NEC Corporation, Kawasaki, Japan.
NEC Software Hokuriku Ltd. Hakusan, Japan.
NEC Software Hokuriku Ltd. Hakusan, Japan.
NEC Software Hokuriku Ltd. Hakusan, Japan.
Show others and affiliations
2006 (English)Conference paper (Refereed)
Abstract [en]

This paper describes the attack on SOSEMANUK, one of the stream ciphers proposed at eSTREAM (the ECRYPT Stream Ci-pher Project) in 2005. The cipher features the variable secret key length from 128-bit up to 256-bit and 128-bit initial vector. The basic operation of the cipher is performed in a unit of 32 bits i.e. \word", and each word generates keystream. This paper shows the result of guess-and-determine attack made on SOSEMANUK. The attack method enables to determine all of 384-bit internal state just after the initialization, using only 2 4 -word keystream. This attack needs about 2224 computations. Thus, when secret key length is longer than 224-bit, it needs less computational e®ort than an exhaustive key search, to break SOSEMANUK. The results show that the cipher has still the 128-bit security as claimed by its designers.

Place, publisher, year, edition, pages
2006. 25-34 p.
Keyword [en]
SOSEMANUK, ECRYPT, eSTREAM, stream cipher, pseudo-random number generator, guess-and-determine attack
National Category
Computer Science
URN: urn:nbn:se:kth:diva-71062OAI: diva2:486487
In State of Art of Stream Ciphers (SASC’06)
NQCAvailable from: 2012-01-30 Created: 2012-01-30 Last updated: 2012-01-31Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Khazaei, Shahram
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 20 hits
ReferencesLink to record
Permanent link

Direct link