Cryptanalysis of the Stream Cipher ABC v2

نویسندگان

  • Hongjun Wu
  • Bart Preneel
چکیده

ABC v2 is a software-efficient stream cipher with 128-bit key. In this paper, we apply a fast correlation attack to break ABC v2 with weak keys. There are about 2 weak keys in ABC v2. The complexity to identify a weak key and to recover the internal state of a weak key is low: identifying one weak key from about 2 random keys requires 6460 keystream bytes and 2 operations for each random key. Recovering the internal state of a weak key requires about 2 keystream bytes and 2 operations. A similar attack can be applied to break ABC v1 with much lower complexity than the previous attack on ABC v1.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of ABC v2

ABC v2 is a stream cipher with 128-bit key. In this paper, we show that there are about 2 weak keys. The complexity to identify each weak key and to recover the internal state is low. To identify a weak key from about 2 random keys, we need 2 keystream bytes from each key, and 2 operations are required for each keystream. Recovering the internal state of a weak key requires about 2 keystream by...

متن کامل

Cryptanalysis and Design of Stream Ciphers

This thesis presents some novel results on the cryptanalysis and design of stream ciphers. The first part of the thesis introduces various stream ciphers design and cryptanalysis techniques. The second part of the thesis gives the cryptanalysis of seven stream ciphers. The properties of addition are exploited in the cryptanalysis of two stream ciphers: the differential-linear cryptanalysis agai...

متن کامل

ABC: A New Fast Flexible Stream Cipher

ABC is a synchronous stream cipher optimized for software applications. Its key length is 128 bits. It accommodates a 128-bit initial vector. Here a version of ABC with a 128-bit key and 32-bit internal variables is presented. A new approach to the design of stream ciphers has been used which results in a cipher based upon keyand clock-dependent state transition and filter functions. More preci...

متن کامل

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

The Probability Advantages of Two Linear Expressions in Symmetric Ciphers

In this paper, we prove the probability advantages of two linear expressions which are summarized from the ABC stream cipher submitted to ECRPYT Estream Project. Two linear expressions with probability advantages reflect the linear correlations among Modular Addition equations. Corresponding to each linear expression and its advantage, a large amount of weak keys are derived under which all the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006