Another Tradeoff Attack on Sprout-Like Stream Ciphers

被引:17
|
作者
Zhang, Bin [1 ,2 ]
Gong, Xinxin [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, TCA Lab, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
关键词
Cryptanalysis; Stream ciphers; Sprout; Tradeoff; NORMALITY;
D O I
10.1007/978-3-662-48800-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sprout is a new lightweight stream cipher with shorter internal state proposed at FSE 2015, using key-dependent state updating in the keystream generation phase. Some analyses have been available on eprint so far. In this paper, we extend the design paradigm in general and study the security of Sprout-like ciphers in a unified framework. Our new penetration is to investigate the k-normality of the augmented function, a vectorial Boolean function derived from the primitive. Based on it, a dedicated time/memory/data tradeoff attack is developed for such designs. It is shown that Sprout can be broken in 2(79-x-y) time, given [c . (2x + 2y -58) . 2(71-x-y)]-bit memory and 2(9+x+y)-bit keystream, where x/y is the number of forward/backward steps and c is a small constant. Our attack is highly flexible and compares favorably to all the previous results. With carefully chosen parameters, the new attack is at least 2(20) times faster than Lallemand/Naya-Plasencia attack at Crypto 2015, Maitra et al. attack and Banik attack, 2(10) times faster than Esgin/Kara attack with much less memory.
引用
收藏
页码:561 / 585
页数:25
相关论文
共 50 条
  • [31] RESYNCHRONIZATION ATTACK ON STREAM CIPHERS FILTERED BY MAIORANA-MCFARLAND FUNCTIONS
    Chew, Guanhan
    Zhang, Aileen
    Khoo, Khoongming
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 159 - 162
  • [32] A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
    Wenfeng Yang
    Yupu Hu
    Frontiers of Computer Science in China, 2011, 5 : 158 - 162
  • [33] An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures
    Bijoy Das
    Amit Sardar
    Swapan Maiti
    Abhijit Das
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2021, 5 (3-4) : 191 - 207
  • [34] New design of LFSR based stream ciphers to resist power attack
    Zhao, Yongbin
    Hu, Yupu
    Jia, Yanyan
    Zhao, Y. (zhaoyb@stdu.edu.cn), 2013, Science Press (40): : 172 - 179
  • [35] Sprout-like Growth of Mesoporous Mo2C/NC Nanonetworks as Efficient Electrocatalysts for Hydrogen Evolution
    Fan, Meihong
    Zheng, Yuenan
    Li, Ang
    Ma, Yali
    Huo, Qisheng
    Qiao, Zhen-An
    Dai, Sheng
    CHEMCATCHEM, 2018, 10 (03) : 625 - 631
  • [36] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Zou, Min-Hui
    Ma, Kun
    Wu, Kai-Jie
    Sha, Edwin Hsing-Mean
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (04) : 646 - 655
  • [37] An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Stankovski, Paul
    Hell, Martin
    Johansson, Thomas
    JOURNAL OF CRYPTOLOGY, 2014, 27 (01) : 1 - 22
  • [38] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    邹敏辉
    马坤
    吴剀劼
    沙行勉
    Journal of Computer Science & Technology, 2014, 29 (04) : 646 - 655
  • [39] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Min-Hui Zou
    Kun Ma
    Kai-Jie Wu
    Edwin Hsing-Mean Sha
    Journal of Computer Science and Technology, 2014, 29 : 646 - 655
  • [40] An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Paul Stankovski
    Martin Hell
    Thomas Johansson
    Journal of Cryptology, 2014, 27 : 1 - 22