Near Collision Attack Against Grain V1

被引:0
|
作者
Banik, Subhadeep [1 ]
Collins, Daniel [2 ]
Meier, Willi [3 ]
机构
[1] Univ Svizzera Italiana, Lugano, Switzerland
[2] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[3] FHNW, Windisch, Switzerland
关键词
Near Collision Attack; Grain v1; LFSR; NFSR; Stream Cipher; CONDITIONAL DIFFERENTIAL CRYPTANALYSIS;
D O I
10.1007/978-3-031-33488-7_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A near collision attack against the Grain v1 stream cipher was proposed by Zhang et al. in Eurocrypt 18. The attack uses the fact that two internal states of the stream cipher with very low hamming distance between them, produce similar keystream sequences which can be identified by simple statistical tests. Such internal states once found in the stream cipher simplify the task of cryptanalysis for the attacker. However this attack has recently come under heavy criticism from Derbez et al. at ToSC 2020:4, who claim that some of the assumptions made in the above paper were not correct. As a result they concluded that the attack presented by Zhang et al. when implemented would take time more than required for a brute force search. In this paper, we take another look at the near collision attack against the Grain v1 stream cipher. We avoid the techniques of the above Eurocrypt paper that have come under criticism, and independently show that a near collision attack can still be applied to Grain v1.
引用
收藏
页码:178 / 207
页数:30
相关论文
共 50 条
  • [1] Near Collision Attack on the Grain v1 Stream Cipher
    Zhang, Bin
    Li, Zhenqi
    Feng, Dengguo
    Lin, Dongdai
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 518 - 538
  • [2] Fast Near Collision Attack on the Grain v1 Stream Cipher
    Zhang, Bin
    Xu, Chao
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 771 - 802
  • [3] Scan Based Side Channel Attack on Grain v1
    Jha, Sonu Kumar
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [4] Differential Fault Attack on Grain v1, ACORN v3 and Lizard
    Siddhanti, Akhilesh
    Sarkar, Santanu
    Maitra, Subhamoy
    Chattopadhyay, Anupam
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2017, 2017, 10662 : 247 - 263
  • [5] Key recovery attack on stream cipher Grain v1 and its improvement
    Yang W.
    Hu Y.
    Gao J.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2010, 45 (05): : 745 - 750
  • [6] Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1
    Li, Jun-Zhi
    Guan, Jie
    IET INFORMATION SECURITY, 2019, 13 (02) : 141 - 148
  • [7] Internal state recovery of Grain v1 employing guess-and-determine attack
    Ma, Zhen
    Tian, Tian
    Qi, Wen-Feng
    IET INFORMATION SECURITY, 2017, 11 (06) : 363 - 368
  • [8] Improving the Resistance of Grain-V1 against Algebraic Attack
    Afzal, Mehreen
    Masood, Ashraf
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1086 - 1090
  • [9] Optimizing Fast Near Collision Attack on Grain Using Linear Programming
    Pan, Senshan
    Wu, Yueping
    Wang, Liangmin
    IEEE ACCESS, 2019, 7 : 181191 - 181201
  • [10] A New Distinguisher on Grain v1 for 106 Rounds
    Sarkar, Santanu
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 334 - 344