Published: July 24, 2013
Author(s)
S. Banik, S. Maitra, S. Sarkar, Meltem Sönmez Turan
Conference
Name: 18th Australasian Conference on Information Security and Privacy (ACISP 2013)
Dates: July 1-3, 2013
Location: Brisbane, Australia
Citation: Information Security and Privacy, Lecture Notes in Computer Science vol. 7959, pp. 13-26
Announcement
Due to the symmetric padding used in the stream cipher Grain v1 and Grain-128, it is possible to find Key-IV pairs that generate shifted keystreams efficiently. Based on this observation, Lee et al. presented a chosen IV related Key attack on Grain v1 and Grain-128 at ACISP 2008. Later, the designers introduced Grain-128a having an asymmetric padding. As a result, the existing idea of chosen IV related Key attack does not work on this new design. In this paper, we present a Key recovery attack on Grain-128a, in a chosen IV related Key setting. We show that using around ?·2^32 (? is a experimentally determined constant and it is sufficient to estimate it as 2^8) related Keys and ?·2^64 chosen IVs, it is possible to obtain 32·? simple nonlinear equations and solve them to recover the Secret Key in Grain-128a.
Due to the symmetric padding used in the stream cipher Grain v1 and Grain-128, it is possible to find Key-IV pairs that generate shifted keystreams efficiently. Based on this observation, Lee et al. presented a chosen IV related Key attack on Grain v1 and Grain-128 at ACISP 2008. Later, the...
See full abstract
Due to the symmetric padding used in the stream cipher Grain v1 and Grain-128, it is possible to find Key-IV pairs that generate shifted keystreams efficiently. Based on this observation, Lee et al. presented a chosen IV related Key attack on Grain v1 and Grain-128 at ACISP 2008. Later, the designers introduced Grain-128a having an asymmetric padding. As a result, the existing idea of chosen IV related Key attack does not work on this new design. In this paper, we present a Key recovery attack on Grain-128a, in a chosen IV related Key setting. We show that using around ?·2^32 (? is a experimentally determined constant and it is sufficient to estimate it as 2^8) related Keys and ?·2^64 chosen IVs, it is possible to obtain 32·? simple nonlinear equations and solve them to recover the Secret Key in Grain-128a.
Hide full abstract
Keywords
cryptography; eStream; Grain-128a; related keys; stream ciphers
Control Families
None selected