用户名: 密码: 验证码:
New Related Key Attacks on the RAKAPOSHI Stream Cipher
详细信息    查看全文
  • 作者:Lin Ding (15)
    Chenhui Jin (15)
    Jie Guan (15)
    Shaowu Zhang (15)
    Ting Cui (15)
    Wei Zhao (16)

    15. Information Science and Technology Institute
    ; 450000 ; Zhengzhou ; China
    16. Science and Technology on Communication Security Laboratory
    ; 610041 ; Chengdu ; China
  • 关键词:Cryptanalysis ; Related key attack ; RAKAPOSHI ; Stream cipher
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2015
  • 出版时间:2015
  • 年:2015
  • 卷:9065
  • 期:1
  • 页码:65-75
  • 全文大小:312 KB
  • 参考文献:1. New European Schemes for Signatures, Integrity, and Encryption, http://www.cryptonessie.org (accessed August 18, 2003)
    2. ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932, http://www.ecrypt.eu.org/stream/ (accessed September 29, 2005)
    3. Cid, C., Kiyomoto, S., Kurihara, J. The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. eds. (2009) Information and Communications Security. Springer, Heidelberg, pp. 32-46
    4. Beth, T., Piper, F. The Stop-and-Go Generator. In: Beth, T., Cot, N., Ingemarsson, I. eds. (1985) Advances in Cryptology. Springer, Heidelberg, pp. 88-92
    5. Simpson, L.R., Dawson, E., Goli膰, J.D.., Millan, W.L. LILI Keystream Generator. In: Stinson, D.R., Tavares, S. eds. (2001) Selected Areas in Cryptography. Springer, Heidelberg, pp. 248-261
    6. Horan, D., Guinee, R.: A Novel Keystream Generator using Pseudo Random Binary Sequences for Cryptographic Applications. In: Proceedings of Irish Signals and Systems Conference, pp. 451鈥?56. IEEE (2006)
    7. Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In: Proceedings of SECRYPT 2007, pp. 204鈥?13 (2007)
    8. Isobe, T., Ohigashi, T., Morii, M. Slide cryptanalysis of lightweight stream cipher RAKAPOSHI. In: Hanaoka, G., Yamauchi, T. eds. (2012) Advances in Information and Computer Security. Springer, Heidelberg, pp. 138-155
    9. Orumiehchiha, M.A., Pieprzyk, J., Shakour, E., Steinfeld, R. Security Evaluation of Rakaposhi Stream Cipher. In: Deng, R.H., Feng, T. eds. (2013) Information Security Practice and Experience. Springer, Heidelberg, pp. 361-371
    10. Ding, L., Guan, J.: Cryptanalysis of RAKAPOSHI Stream Cipher, Cryptology ePrint Archive Report 2012/696, http://eprint.iacr.org/
  • 作者单位:Information Security Practice and Experience
  • 丛书名:978-3-319-17532-4
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
RAKAPOSHI is a hardware oriented stream cipher designed by Cid et al. in 2009. It is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some mistakes existing in the related key attack on RAKAPOSHI by Isobe et al., and propose a new related key attack on RAKAPOSHI, which recovers the 128-bit secret key with a time complexity of 256, requiring one related key and 255 chosen IVs. Furthermore, an improved key recovery attack on RAKAPOSHI in the multiple related key setting is proposed with a time complexity of 233, requiring 212.58 chosen IVs. As confirmed by the experimental results, our new attack can recover all 128 key bits of RAKAPOSHI in less than 1.5 hours on a PC.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700