Near Collision Attack Against Grain V1

被引:0
|
作者
Banik, Subhadeep [1 ]
Collins, Daniel [2 ]
Meier, Willi [3 ]
机构
[1] Univ Svizzera Italiana, Lugano, Switzerland
[2] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[3] FHNW, Windisch, Switzerland
关键词
Near Collision Attack; Grain v1; LFSR; NFSR; Stream Cipher; CONDITIONAL DIFFERENTIAL CRYPTANALYSIS;
D O I
10.1007/978-3-031-33488-7_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A near collision attack against the Grain v1 stream cipher was proposed by Zhang et al. in Eurocrypt 18. The attack uses the fact that two internal states of the stream cipher with very low hamming distance between them, produce similar keystream sequences which can be identified by simple statistical tests. Such internal states once found in the stream cipher simplify the task of cryptanalysis for the attacker. However this attack has recently come under heavy criticism from Derbez et al. at ToSC 2020:4, who claim that some of the assumptions made in the above paper were not correct. As a result they concluded that the attack presented by Zhang et al. when implemented would take time more than required for a brute force search. In this paper, we take another look at the near collision attack against the Grain v1 stream cipher. We avoid the techniques of the above Eurocrypt paper that have come under criticism, and independently show that a near collision attack can still be applied to Grain v1.
引用
收藏
页码:178 / 207
页数:30
相关论文
共 50 条
  • [21] New State Recovery Attacks on the Grain v1 Stream Cipher
    Lin Ding
    Chenhui Jin
    Jie Guan
    Shaowu Zhang
    Junzhi Li
    Hong Wang
    Wei Zhao
    中国通信, 2016, 13 (11) : 180 - 188
  • [22] A Practical DPA on Grain v1 using LS-SVM
    Chakraborty, Abhishek
    Mazumdar, Bodhisatwa
    Mukhopadhyay, Debdeep
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 44 - 47
  • [23] New State Recovery Attacks on the Grain v1 Stream Cipher
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Li, Junzhi
    Wang, Hong
    Zhao, Wei
    CHINA COMMUNICATIONS, 2016, 13 (11) : 180 - 188
  • [24] Functional architecture for "far" and "near" judgment in cat's V1
    Wang, Ling
    Dai, Zhengqiang
    Yin, Jiaojiao
    Li, Chaoyi
    I-PERCEPTION, 2014, 5 (04): : 286 - 286
  • [25] NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
    Mallik, Dibyendu
    Mukhopadhyay, Debdeep
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 427 - 430
  • [26] Experimental Evaluation of Certain Security Issues of Grain v1 Stream Cipher
    Arsic, Aleksandra
    Jelisavcic, Vladisav
    Mihaljevic, Miodrag J.
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2016, 12 (02):
  • [27] Improved Conditional Differential Attacks on Round-Reduced Grain v1
    Li, Jun-Zhi
    Guan, Jie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
  • [28] FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet
    Li, Bohan
    Liu, Meicheng
    Lin, Dongdai
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 78 (78)
  • [29] Higher Order Differential Attack on Step-Reduced Variants of Luffa v1
    Watanabe, Dai
    Hatano, Yasuo
    Yamada, Tsuyoshi
    Kaneko, Toshinobu
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 270 - +
  • [30] Typing High-Speed Cryptography against Spectre v1
    Shivakumar, Basavesh Ammanaghatta
    Barthe, Gilles
    Gregoire, Benjamin
    Laporte, Vincent
    Oliveira, Tiago
    Priya, Swarn
    Schwabe, Peter
    Tabary-Maujean, Lucas
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1094 - 1111