The Achterbahn Stream Cipher
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of Achterbahn
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the reduced and the full version with complexity of 2 and 2 steps. Extensions of our attacks are also described to break modified versions of the Achterbahn stream cipher, which were proposed following the publication of preliminary cryptanalysis results. These attacks hi...
متن کاملImproved Boolean Combining Functions for Achterbahn
The Boolean combining function in the 80-bit-key stream cipher Achterbahn [1] is weak. Its major weakness consists of the fact that by setting two specific variables to zero, the function becomes linear. Its second weakness consists of the fact that it can be approximated by a linear function which agrees with the Boolean combining function with probability 3/4. By exploiting the first weakness...
متن کاملCryptanalysis of Achterbahn-128/80
This paper presents two key-recovery attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn80, has complexity 2. The attack against Achterbahn-128 requires 2 operations and 2 keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterb...
متن کاملCryptanalyse de Achterbahn-128/80
This paper presents two attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against...
متن کاملCryptanalysis of Achterbahn-Version 2
Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had been successfully cryptanalyzed, the second version, denoted Achterbahn-Version 2, was proposed. This paper demonstrates an attack on this second version. In the attack, a quadratic approximation of the output function is considered. The attack uses less keystream bits than the upper limit given...
متن کامل