Algebraic analysis of Trivium-like ciphers
Data(s) |
30/04/2013
|
---|---|
Resumo |
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. |
Formato |
application/pdf |
Identificador | |
Relação |
http://eprints.qut.edu.au/59505/1/Algebraic_analysis_of_Trivium-like_ciphers.pdf Teo, Sui-Guan, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, & Dawson, Edward (2013) Algebraic analysis of Trivium-like ciphers. [Working Paper] (Unpublished) |
Direitos |
Copyright 2013 Please consult the authors. |
Fonte |
School of Electrical Engineering & Computer Science; Institute for Future Environments; School of Mathematical Sciences; Science & Engineering Faculty |
Palavras-Chave | #080402 Data Encryption #Stream ciphers #Trivium #Trivium-N #Bivium-A #Bivium-B #Algebraic attacks |
Tipo |
Working Paper |