Another Tradeoff Attack on Sprout-Like Stream Ciphers

被引:17
|
作者
Zhang, Bin [1 ,2 ]
Gong, Xinxin [1 ]
机构
[1] Chinese Acad Sci, Inst Software, SKLCS, TCA Lab, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
关键词
Cryptanalysis; Stream ciphers; Sprout; Tradeoff; NORMALITY;
D O I
10.1007/978-3-662-48800-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sprout is a new lightweight stream cipher with shorter internal state proposed at FSE 2015, using key-dependent state updating in the keystream generation phase. Some analyses have been available on eprint so far. In this paper, we extend the design paradigm in general and study the security of Sprout-like ciphers in a unified framework. Our new penetration is to investigate the k-normality of the augmented function, a vectorial Boolean function derived from the primitive. Based on it, a dedicated time/memory/data tradeoff attack is developed for such designs. It is shown that Sprout can be broken in 2(79-x-y) time, given [c . (2x + 2y -58) . 2(71-x-y)]-bit memory and 2(9+x+y)-bit keystream, where x/y is the number of forward/backward steps and c is a small constant. Our attack is highly flexible and compares favorably to all the previous results. With carefully chosen parameters, the new attack is at least 2(20) times faster than Lallemand/Naya-Plasencia attack at Crypto 2015, Maitra et al. attack and Banik attack, 2(10) times faster than Esgin/Kara attack with much less memory.
引用
收藏
页码:561 / 585
页数:25
相关论文
共 50 条
  • [41] Scan-based side channel attack on stream ciphers and its prevention
    Sandip Karmakar
    Dipanwita Roy Chowdhury
    Journal of Cryptographic Engineering, 2018, 8 : 327 - 340
  • [42] Scan-based side channel attack on stream ciphers and its prevention
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (04) : 327 - 340
  • [43] Chosen ciphertext attack on a new class of self-synchronizing stream ciphers
    Zhang, B
    Wu, HJ
    Feng, DG
    Bao, F
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 73 - 83
  • [44] A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers
    Chakraborty, Abhishek
    Mazumdar, Bodhisatwa
    Mukhopadhyay, Debdeep
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (12) : 1968 - 1977
  • [45] Synthesis of Janus Mesoporous Silica Nanostructures with Organic-Inorganic Hybrid Components through a Sprout-Like Growth Method
    Wang, Xue
    Guan, Buyuan
    He, Yapeng
    Zhang, Ye
    Cao, Yu
    Liu, Yunling
    Qiao, Zhen-An
    Huo, Qisheng
    CHEMNANOMAT, 2015, 1 (08) : 562 - 566
  • [46] Guess-and-determine attacks on PANAMA-like stream ciphers
    Jiao, Lin
    Li, Yongqiang
    Hao, Yonglin
    IET INFORMATION SECURITY, 2018, 12 (06) : 484 - 497
  • [47] DefScan: Provably Defeating Scan Attack on AES-Like Ciphers
    Sao, Yogendra
    Ali, Sk. Subidh
    Mazumdar, Bodhisatwa
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (08) : 2326 - 2339
  • [48] AN ALGEBRAIC ATTACK ON STREAM CIPHERS WITH APPLICATION TO NONLINEAR FILTER GENERATORS AND WG-PRNG
    Mascia, Carla
    Piccione, Enrico
    Sala, Massimiliano
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (06) : 1710 - 1722
  • [49] A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter
    Zhong, Xiao
    Wang, Mingsheng
    Zhang, Bin
    Wu, Shengbao
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 132 - 142
  • [50] Breaking GEA-Like Stream Ciphers with Lower Time Cost
    Wu, Zheng
    Ding, Lin
    Li, Zhengting
    Wang, Xinhai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 186 - 204