Improved Guess and Determine attack on the MASHA stream cipher

被引:0
|
作者
Lin Ding
Dawu Gu
Lei Wang
Chenhui Jin
Jie Guan
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] Zhengzhou Information Science and Technology Institute,undefined
[3] Westone Cryptologic Research Center,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
So far, no attack on MASHA has been published, besides the security analysis by its designers. In this study, based on optimizing the guess and determination process of the designers’ Guess and Determine attack, we propose an improved Guess and Determine attack on MASHA with time complexity of 2224, which improves their attack by a factor of 296. To the best of our knowledge, this is the best attack on MASHA so far.
引用
收藏
相关论文
共 50 条
  • [21] Differential Fault Attack on the Stream Cipher LIZARD
    MA Zhen
    TIAN Tian
    QI Wenfeng
    ChineseJournalofElectronics, 2021, 30 (03) : 534 - 541
  • [22] Differential Fault Attack on the Stream Cipher LIZARD
    Ma Zhen
    Tian Tian
    Qi Wenfeng
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 534 - 541
  • [23] Chosen ciphertext attack on a chaotic stream cipher
    Lin, Zhuosheng
    Yu, Simin
    Lu, Jinhu
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 5390 - 5394
  • [24] Slide attack on modified Trivium stream cipher
    Guan, Jie
    Ding, Lin
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2012, 46 (06): : 926 - 930
  • [25] The Boomerang Attack on ChaCha Stream Cipher Permutation
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    2024 6TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET, ICCCI 2024, 2024, : 18 - 23
  • [26] Fault attack on Enocoro stream cipher family
    Rostami, Saeed
    Orumiehchiha, Mohammad Ali
    Shakour, Elham
    Alizadeh, Sadegh
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2025, 15 (01)
  • [27] Algebraic cube attack on Sfinks stream cipher
    Li, Shunbo
    Hu, Yupu
    Zhao, Yongbin
    Wang, Yan
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4295 - 4302
  • [28] A Byte-Based Guess and Determine Attack on SOSEMANUK
    Feng, Xiutao
    Liu, Jun
    Zhou, Zhaocun
    Wu, Chuankun
    Feng, Dengguo
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 146 - 157
  • [29] Heuristic guess-and-determine attacks on stream ciphers
    Ahmadi, H.
    Eghlidos, T.
    IET INFORMATION SECURITY, 2009, 3 (02) : 66 - 73
  • [30] A complete divide and conquer attack on the alphal stream cipher
    Chen, K
    Simpson, L
    Henricksen, M
    Millan, W
    Dawson, E
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 418 - 431