Related-key chosen IV attacks on Grain-v1 and Grain-128

被引:0
|
作者
Lee, Yuseop [1 ]
Jeong, Kitae [1 ]
Sung, Jaechul [2 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Univ Seoul, Dept Math, Seoul, South Korea
来源
关键词
stream cipher; Grain-v1; Grain-128; related-key chosen IV attack; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2(22.59) chosen IVs, 2(26.29)-bit keystream sequences and 2(22.90) computational complexity. To recover the secret key of Grain-128, our attack requires 2(26.59) chosen IVs, 2(31.39)-bit keystream sequences and 2(27.01) computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.
引用
收藏
页码:321 / +
页数:3
相关论文
共 47 条
  • [31] A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
    Vahid Amin Ghafari
    Honggang Hu
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2393 - 2400
  • [32] Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128
    Jeong, Kitae
    Lee, Changhoon
    Sung, Jaechul
    Hong, Seokhie
    Limi, Jongin
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 143 - +
  • [33] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 17 - 33
  • [34] A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a
    Ghafari, Vahid Amin
    Hu, Honggang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (06) : 2405 - 2412
  • [35] Related-Key Attacks on Reduced-Round Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 126 - 137
  • [36] Improved conditional differential attacks on Grain v1
    Ma, Zhen
    Tian, Tian
    Qi, Wen-Feng
    IET INFORMATION SECURITY, 2017, 11 (01) : 46 - 53
  • [37] 一种针对Grain-v1的新差分错误攻击
    王璐
    胡予濮
    张振广
    计算机科学, 2011, 38 (08) : 80 - 82
  • [38] Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
    Sahoo, Soumya
    Patil, Raghavendra
    Mondal, Sandip Kumar
    Sarkar, Santanu
    Rebeiro, Chester
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [39] Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
    Hong, S
    Kim, J
    Lee, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 368 - 383
  • [40] Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b
    Lee, C
    Kim, J
    Hong, S
    Sung, J
    Lee, S
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 244 - 262