Another Tradeoff Attack on Sprout-Like Stream Ciphers

被引:17
|
作者
Zhang, Bin [1 ,2 ]
Gong, Xinxin [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, TCA Lab, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
关键词
Cryptanalysis; Stream ciphers; Sprout; Tradeoff; NORMALITY;
D O I
10.1007/978-3-662-48800-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sprout is a new lightweight stream cipher with shorter internal state proposed at FSE 2015, using key-dependent state updating in the keystream generation phase. Some analyses have been available on eprint so far. In this paper, we extend the design paradigm in general and study the security of Sprout-like ciphers in a unified framework. Our new penetration is to investigate the k-normality of the augmented function, a vectorial Boolean function derived from the primitive. Based on it, a dedicated time/memory/data tradeoff attack is developed for such designs. It is shown that Sprout can be broken in 2(79-x-y) time, given [c . (2x + 2y -58) . 2(71-x-y)]-bit memory and 2(9+x+y)-bit keystream, where x/y is the number of forward/backward steps and c is a small constant. Our attack is highly flexible and compares favorably to all the previous results. With carefully chosen parameters, the new attack is at least 2(20) times faster than Lallemand/Naya-Plasencia attack at Crypto 2015, Maitra et al. attack and Banik attack, 2(10) times faster than Esgin/Kara attack with much less memory.
引用
收藏
页码:561 / 585
页数:25
相关论文
共 50 条
  • [21] A fast correlation attack for LFSR-based stream ciphers
    Palit, S
    Roy, BK
    De, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 331 - 342
  • [22] Cube Attack on Stream Ciphers using a Modified Linearity Test
    Srinivasan, Chungath
    Pillai, Utkarsh Umesan
    Lakshmy, K. V.
    Sethumadhavan, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 301 - 311
  • [23] Cube Attack on Trivium and A5/1 Stream Ciphers
    Islam, Saad
    Ul Hag, Inam
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 409 - 415
  • [24] Correlation Power Analysis Attack against Synchronous Stream Ciphers
    Wu, Keke
    Li, Huiyun
    Peng, Bo
    Yu, Fengqi
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2067 - +
  • [25] Multi-pass fast correlation attack on stream ciphers
    Zhang, Bin
    Feng, Dengguo
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 234 - +
  • [26] Generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    Golic, Jovan Dj.
    Mihaljevic, Miodrag J.
    Journal of Cryptology, 1991, 3 (03) : 201 - 212
  • [27] Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
    Dunkelman, Orr
    Keller, Nathan
    INFORMATION PROCESSING LETTERS, 2008, 107 (05) : 133 - 137
  • [28] Algebraic attacks on trivium-like stream ciphers
    Guan, Jie, 1600, Shanghai Jiaotong University (48):
  • [29] A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
    Yang, Wenfeng
    Hu, Yupu
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (02): : 158 - 162
  • [30] The rainbow attack on stream ciphers based on Maiorana-McFarland functions
    Khoo, Khoongming
    Gong, Guang
    Lee, Hian-Kiat
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 194 - 209