Related Key Chosen IV Attack on Grain-128a Stream Cipher

被引:16
作者
Ding, Lin [1 ]
Guan, Jie [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalysis; grain-128a; related key chosen IV attack; stream cipher; DIFFERENTIAL CRYPTANALYSIS; PY-FAMILY;
D O I
10.1109/TIFS.2013.2256419
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Agren, Hell, Johansson, and Meier. The designers claimed that Grain-128a is strengthened against all known attacks and observations on the original Grain-128. So far there exists no attack on Grain-128a except a differential fault attack by Banik, Maitra, and Sarkar. In this paper, we give some observations on Grain-128a, and then propose a related key chosen IV attack on Grain-128a based on these observations. Our attack can recover the 128-bit secret key of Grain-128a with a computational complexity of 2(96.322), requiring 2(96) chosen IVs and 2(103.613) keystream bits. The success probability of our attack is 0.632. This related key attack is "minimal" in the sense that it only requires two related keys. The result shows that our attack is much better than an exhaustive key search in the related key setting.
引用
收藏
页码:803 / 809
页数:7
相关论文
共 27 条
  • [1] Grain-128a: A new version of Grain-128 with optional authentication
    Ågren M.
    Hell M.
    Johansson T.
    Meier W.
    [J]. International Journal of Wireless and Mobile Computing, 2011, 5 (01) : 48 - 59
  • [2] Agren M., 2011, P SYMM KEY ENCR WORK
  • [3] Aumasson J.-P., 2009, IACR CRYPTOL EPRINT, V2009
  • [4] Banik S, 2012, LECT NOTES COMPUT SC, V7428, P122, DOI 10.1007/978-3-642-33027-8_8
  • [5] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
  • [6] BIHAM E, 1994, J CRYPTOL, V7, P229, DOI 10.1007/BF00203965
  • [7] Biryukov A., 2012, P 19 INT WORKSH SEL, P208
  • [8] De Cannière C, 2008, LECT NOTES COMPUT SC, V5023, P276
  • [9] Cryptanalysis of Loiss Stream Cipher
    Ding, Lin
    Guan, Jie
    [J]. COMPUTER JOURNAL, 2012, 55 (10) : 1192 - 1201
  • [10] Ding L, 2012, J UNIVERS COMPUT SCI, V18, P1741