Related Key Chosen IV Attack on Grain-128a Stream Cipher

被引:16
|
作者
Ding, Lin [1 ]
Guan, Jie [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; grain-128a; related key chosen IV attack; stream cipher; DIFFERENTIAL CRYPTANALYSIS; PY-FAMILY;
D O I
10.1109/TIFS.2013.2256419
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Agren, Hell, Johansson, and Meier. The designers claimed that Grain-128a is strengthened against all known attacks and observations on the original Grain-128. So far there exists no attack on Grain-128a except a differential fault attack by Banik, Maitra, and Sarkar. In this paper, we give some observations on Grain-128a, and then propose a related key chosen IV attack on Grain-128a based on these observations. Our attack can recover the 128-bit secret key of Grain-128a with a computational complexity of 2(96.322), requiring 2(96) chosen IVs and 2(103.613) keystream bits. The success probability of our attack is 0.632. This related key attack is "minimal" in the sense that it only requires two related keys. The result shows that our attack is much better than an exhaustive key search in the related key setting.
引用
收藏
页码:803 / 809
页数:7
相关论文
共 50 条
  • [31] New Related Key Attacks on the RAKAPOSHI Stream Cipher
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Cui, Ting
    Zhao, Wei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 65 - 75
  • [32] Fast Near Collision Attack on the Grain v1 Stream Cipher
    Zhang, Bin
    Xu, Chao
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 771 - 802
  • [33] Chosen IV statistical analysis for key recovery attacks on stream ciphers
    Fischer, Simon
    Khazaei, Shahrarn
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 236 - +
  • [34] A practical key recovery attack on the lightweight WG-5 stream cipher
    Ding, Lin
    Liao, Zhiyi
    Li, Zhengting
    Wu, Zheng
    Wang, Xinhai
    Guan, Ziyu
    HELIYON, 2024, 10 (02)
  • [35] Related-Key Boomerang Attack on Block Cipher SQUARE
    Koo, Bonwook
    Yeom, Yongjin
    Song, Junghwan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 3 - 9
  • [36] Design and implementation of DPA resistive Grain-128 stream cipher based on SABL logic
    Atani, R. Ebrahimi
    Meier, W.
    Mirzakuchaki, S.
    Atani, S. Ebrahimi
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2008, 3 : 293 - 298
  • [37] Correlation Power Analysis Attack on the PingPong-128 Key Stream Generator
    Kang, Young-Jin
    Kim, Hyun Ho
    Bruce, Ndibanje
    Park, YoungGoo
    Lee, HoonJae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 506 - 509
  • [38] Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1
    Li, Jun-Zhi
    Guan, Jie
    IET INFORMATION SECURITY, 2019, 13 (02) : 141 - 148
  • [39] Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
    Salam, Iftekhar
    Ooi, Thian Hooi
    Xue, Luxin
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C. -W.
    IEEE ACCESS, 2021, 9 : 72568 - 72586
  • [40] NEW RELATED-KEY ATTACKS AND PROPERTIES OF SKINNY-64-128 CIPHER
    Posteuca, Raluca
    Negara, Gabriel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 333 - 349