Related Key Chosen IV Attack on Grain-128a Stream Cipher

被引:16
|
作者
Ding, Lin [1 ]
Guan, Jie [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; grain-128a; related key chosen IV attack; stream cipher; DIFFERENTIAL CRYPTANALYSIS; PY-FAMILY;
D O I
10.1109/TIFS.2013.2256419
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Agren, Hell, Johansson, and Meier. The designers claimed that Grain-128a is strengthened against all known attacks and observations on the original Grain-128. So far there exists no attack on Grain-128a except a differential fault attack by Banik, Maitra, and Sarkar. In this paper, we give some observations on Grain-128a, and then propose a related key chosen IV attack on Grain-128a based on these observations. Our attack can recover the 128-bit secret key of Grain-128a with a computational complexity of 2(96.322), requiring 2(96) chosen IVs and 2(103.613) keystream bits. The success probability of our attack is 0.632. This related key attack is "minimal" in the sense that it only requires two related keys. The result shows that our attack is much better than an exhaustive key search in the related key setting.
引用
收藏
页码:803 / 809
页数:7
相关论文
共 50 条
  • [41] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Lu, Jiqiang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 1 - 11
  • [42] Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher
    Fleischmann, Ewan
    Gorski, Michael
    Lucks, Stefan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 298 - 309
  • [43] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Jiqiang Lu
    International Journal of Information Security, 2009, 8 : 1 - 11
  • [44] A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    Jin, Chenhui
    Guan, Jie
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [45] Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
    Tsunoo, Yukiyasu
    Saito, Teruo
    Kubo, Hiroyasu
    Suzaki, Tomoyasu
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 128 - +
  • [46] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
    Cogliati, Benoit
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 584 - 613
  • [47] The Key and IV Setup of the Stream Ciphers HC-256 and HC-128
    Liu, Yunyi
    Qin, Tuanfa
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 430 - 433
  • [48] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Jiqiang Lu
    Designs, Codes and Cryptography, 2011, 60 : 123 - 143
  • [49] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [50] Improved Key Recovery Attack on the BEAN Stream Cipher (vol E96A, pg 1437, 2013)
    Wang, Hui
    Hell, Martin
    Johansson, Thomas
    Agren, Martin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (07) : 1683 - 1683