Analysis of chosen plaintext attacks on the WAKE Stream Cipher
نویسنده
چکیده
Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10 and 10.
منابع مشابه
Differential-Linear Attacks against the Stream
The previous key recovery attacks against Helix obtain the key with about 2 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 2 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 2 chosen nonces and 2 chosen plaint...
متن کاملDifferential-Linear Attacks Against the Stream Cipher Phelix
The previous key recovery attacks against Helix obtain the key with about 2 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 2 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 2 chosen nonces and 2 chosen plaint...
متن کاملDifferential Attacks against the Helix Stream Cipher
In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE’03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks. The first attack requires 2 basic operations and processes only 2 words of chosen plaintext in order to recover the secr...
متن کاملSlide Attacks
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its number of rounds is made very large. In this paper we describe a new generic known(or sometimes chosen-) plaintext attack on product ciphers, which we call the slide attack and which in many cases is independent of the number of rounds of a cipher. We illustrate the power...
متن کاملCryptanalysis of Hiji-bij-bij (HBB)
In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher in the “B mode” or as an asynchronous stream cipher in the “SS mode”. In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2 and 256-bit key with the complexi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2001 شماره
صفحات -
تاریخ انتشار 2001