Improved Guess and Determine attack on the MASHA stream cipher

被引:0
|
作者
Lin Ding
Dawu Gu
Lei Wang
Chenhui Jin
Jie Guan
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] Zhengzhou Information Science and Technology Institute,undefined
[3] Westone Cryptologic Research Center,undefined
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
So far, no attack on MASHA has been published, besides the security analysis by its designers. In this study, based on optimizing the guess and determination process of the designers’ Guess and Determine attack, we propose an improved Guess and Determine attack on MASHA with time complexity of 2224, which improves their attack by a factor of 296. To the best of our knowledge, this is the best attack on MASHA so far.
引用
收藏
相关论文
共 50 条
  • [41] Efficiency of Two Versions of SNOW against Guess & Determine Attack
    Tahir, Muhammad
    Mujtaba, Ghulam
    Zia, Saood
    Naz, Tarranum
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (01): : 47 - 58
  • [42] An Improved Hardware Implementation of the Grain Stream Cipher
    Mansouri, Shohreh Sharif
    Dubrova, Elena
    13TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, 2010, : 433 - 440
  • [43] Improved cryptanalysis of the stream cipher polar bear
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Chin J Electron, 2007, 3 (439-442):
  • [44] An improved algorithm of stream cipher based on LFSR
    Feng, Lifeng
    Wang, Xiaofeng
    Fang, Yingjue
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [45] Improved cryptanalysis of the stream cipher polar bear
    Huang Xiaoli
    Wu Chuankun
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (03): : 439 - 442
  • [46] A new distinguishing and key recovery attack on NGG stream cipher
    Aleksandar Kircanski
    Rabeah Al-Zaidy
    Amr M. Youssef
    Cryptography and Communications, 2009, 1 : 269 - 282
  • [47] Cube attack on stream cipher E0: revisited
    Deepthi K.K.C.
    Singh K.
    Konduru S.K.
    International Journal of Information Technology, 2022, 14 (5) : 2575 - 2584
  • [48] A new distinguishing and key recovery attack on NGG stream cipher
    Kircanski, Aleksandar
    Al-Zaidy, Rabeah
    Youssef, Amr M.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (02): : 269 - 282
  • [49] An algebraic attack to the Bluetooth stream cipher E0
    La Scala, Roberto
    Polese, Sergio
    Tiwari, Sharwan K.
    Visconti, Andrea
    FINITE FIELDS AND THEIR APPLICATIONS, 2022, 84
  • [50] Simulated Leakage Power Analysis Attack of the Trivium Stream Cipher
    Palma, Kenneth
    Moll, Francesc
    PROCEEDINGS OF THE 37TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS 2022), 2022, : 191 - 196