An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

被引:4
|
作者
Stankovski, Paul [1 ]
Hell, Martin [1 ]
Johansson, Thomas [1 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, S-22100 Lund, Sweden
关键词
Stream cipher; FCSR; X-FCSR; Cryptanalysis; State recovery; F-FCSR;
D O I
10.1007/s00145-012-9130-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a state recovery attack on the X-FCSR family of stream ciphers. In this attack we analyse each block of output keystream and try to solve for the state. The solver will succeed when a number of state conditions are satisfied. For X-FCSR-256, our best attack has a computational complexity of only 2(4.7) table lookups per block of keystream, with an expected 2(44.3) such blocks before the attack is successful. The precomputational storage requirement is 2(33). For X-FCSR-128, the computational complexity of our best attack is 2(16.3) table lookups per block of keystream, where we expect 2(55.2) output blocks before the attack comes through. The precomputational storage requirement for X-FCSR-128 is 2(67).
引用
收藏
页码:1 / 22
页数:22
相关论文
共 21 条
  • [1] An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
    Paul Stankovski
    Martin Hell
    Thomas Johansson
    Journal of Cryptology, 2014, 27 : 1 - 22
  • [2] An Efficient State Recovery Attack on X-FCSR-256
    Stankovski, Paul
    Hell, Martin
    Johansson, Thomas
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 23 - 37
  • [3] New Key Recovery Attack on the MICKEY Family of Stream Ciphers
    Ding, Lin
    Gu, Dawu
    Wang, Lei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 239 - 249
  • [4] X-FCSR - A new software oriented stream cipher based upon FCSRs
    Arnault, Francois
    Berger, Thierry P.
    Lauradoux, Cedric
    Minier, Marine
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 341 - +
  • [5] Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM
    Shahapure, Shravani
    Sule, Virendra
    Daruwala, R. D.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 34 - 49
  • [6] A Fault Attack on the Family of Enocoro Stream Ciphers
    Danner, Julian
    Kreuzer, Martin
    CRYPTOGRAPHY, 2021, 5 (04)
  • [7] A differential fault attack on the WG family of stream ciphers
    Orumiehchiha, Mohammad Ali
    Rostami, Saeed
    Shakour, Elham
    Pieprzyk, Josef
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 189 - 195
  • [8] A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
    Datta, Pratish
    Roy, Dibyendu
    Mukhopadhyay, Sourav
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 558 - 565
  • [9] A differential fault attack on the WG family of stream ciphers
    Mohammad Ali Orumiehchiha
    Saeed Rostami
    Elham Shakour
    Josef Pieprzyk
    Journal of Cryptographic Engineering, 2020, 10 : 189 - 195
  • [10] A Differential Fault Attack on the Grain Family of Stream Ciphers
    Banik, Subhadeep
    Maitra, Subhamoy
    Sarkar, Santanu
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 122 - 139