Probabilistic algebraic attack on plantlet lightweight stream cipher

被引:0
|
作者
Sharma, Dheeraj Kumar [1 ]
Pandey, Rajoo [1 ]
Chatterjee, Tapas [2 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Elect & Commun Engn, Kurukshetra 136119, Haryana, India
[2] Indian Inst Technol Ropar, Dept Math, Rupnagar 140001, Punjab, India
关键词
Boolean function; algebraic attack; lightweight stream cipher; linear feedback shift register; nonlinear feedback shift register; low degree multiple; CRYPTANALYSIS; ALGORITHM;
D O I
10.1007/s12046-023-02287-w
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Plantlet is a new variant of Sprout lightweight stream cipher. It uses 61 bit LFSR and 40 bit NFSR. This paper presents a study of Plantlet stream cipher with probability based approach for making algebraic attack on Plantlet. In this paper, we have used low degree multiple of Boolean function to apply algebraic attack. The low degree multiple of Boolean function is multiplied to output keystream function in order to get output equation such that it consists of only LFSR state variables. These equations are further solved to find secret key and internal states. In this manner, the complexity of solving equations is reduced. In this paper, it takes 2(60.99) Plantlet encryptions to solve system of equations. Commonly, standard algebraic attack and fast algebraic attack have been applied on various stream ciphers. However, the probabilistic algebraic attack has been implemented on Grain family of stream ciphers but not on Plantlet. The probabilistic algebraic attack can be applied on other stream ciphers.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] LESCA: LightwEight Stream Cipher Algorithm for emerging systems
    Noura, Hassan
    Salman, Ola
    Couturier, Raphael
    Chehab, Ali
    AD HOC NETWORKS, 2023, 138
  • [32] Cryptanalysis of WG-7: a lightweight stream cipher
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Ron Steinfeld
    Cryptography and Communications, 2012, 4 : 277 - 285
  • [33] Improved Related-Cipher Attack on Salsa20 Stream Cipher
    Ding, Lin
    IEEE ACCESS, 2019, 7 : 30197 - 30202
  • [34] A complete divide and conquer attack on the alphal stream cipher
    Chen, K
    Simpson, L
    Henricksen, M
    Millan, W
    Dawson, E
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 418 - 431
  • [35] Improved Key Recovery Attack on the BEAN Stream Cipher
    Wang, Hui
    Hell, Martin
    Johansson, Thomas
    Agren, Martin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1437 - 1444
  • [36] An Improved Differential Fault Attack on the Stream Cipher Espresso
    Das, Debendranath
    Ghatak, Anirban
    Gupta, Indivar
    Karati, Sabyasachi
    Mandal, Arindam
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT II, 2025, 15496 : 73 - 89
  • [37] A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium
    La Scala, Roberto
    Pintore, Federico
    Tiwari, Sharwan K.
    Visconti, Andrea
    FINITE FIELDS AND THEIR APPLICATIONS, 2024, 98
  • [38] Distinguishing attack on SN3 stream cipher
    Orumiehchi, Mohammad Ali
    Mohebbipoor, S. Fahimeh
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1392 - 1395
  • [39] Preventing Fault Attack on Stream Cipher using Randomization
    Ghosh, Shamit
    Chowdhury, Dipanwita Roy
    2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 88 - 91
  • [40] Distinguishing attack on stream cipher HC-256'
    Li, S.-B. (shunboli@163.com), 2012, Science Press (34):