Algebraic cryptanalysis of a small-scale version of stream cipher Lex

被引:2
|
作者
Velichkov, V. [1 ,2 ]
Rijmen, V. [1 ,2 ,3 ]
Preneel, B. [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Heverlee, Belgium
[2] Interdisciplinary Inst BroadBand Technol IBBT, B-9050 Ghent, Belgium
[3] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
关键词
BLOCK CIPHERS;
D O I
10.1049/iet-ifs.2009.0118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, the authors analyse with respect to algebraic attacks a small-scale version of the stream cipher Lex. They base it on a small-scale version of the block cipher advanced encryption standard (AES) with 16-bit state and 16-bit key. They represent the small-scale Lex and its key schedule in two alternative ways: as a system of cubic boolean equations and as a system of quadratic boolean equations. The authors use Grobner bases to solve the two systems for different number of rounds and sizes of the leak. They obtain the best results for the quadratic representation of the cipher. For this case they are able to recover the secret key in time less than 2 min by solving a system of 374 quadratic boolean equations in 208 unknowns resulting from 5 rounds of the cipher.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 50 条
  • [21] Cryptanalysis of a Chaos-based Stream Cipher
    Zhang, Bin
    Jin, Chenhui
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2782 - 2785
  • [22] Cryptanalysis of Loiss Stream Cipher-Revisited
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Wang, Qiuyan
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [23] Improved cryptanalysis of the stream cipher polar bear
    Huang Xiaoli
    Wu Chuankun
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (03): : 439 - 442
  • [24] Cryptanalysis of stream cipher Alpha1
    Wu, HJ
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 169 - 175
  • [25] Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY
    Tischhauser, Elmar
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (04) : 317 - 348
  • [26] Improved cryptanalysis of the stream cipher polar bear
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Chin J Electron, 2007, 3 (439-442):
  • [27] Cryptanalysis of Stream Cipher Using Density Evolution
    Refaey, Ahmed
    Loukhaoukha, Khaled
    Dahmane, Adel
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 382 - 383
  • [28] Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
    Nakahara, Jorge, Jr.
    Sepehrdad, Pouyan
    Zhang, Bingsheng
    Wang, Meiqin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 58 - +
  • [29] LOCAL REDUCTION AND THE ALGEBRAIC CRYPTANALYSIS OF THE BLOCK CIPHER GOST
    Zajac, Pavol
    Cagala, Radoslav
    PERIODICA MATHEMATICA HUNGARICA, 2012, 65 (02) : 239 - 255
  • [30] Algebraic Cryptanalysis of PRINCE Cipher Based on the Method of Syllogisms
    Lacko-Bartosova, Lucia
    INFORMATICS 2013: PROCEEDINGS OF THE TWELFTH INTERNATIONAL CONFERENCE ON INFORMATICS, 2013, : 56 - 60