|
| | | |
Algebraic analysis of Trivium-like ciphers (Poster)
Teo, S., Wong, K. K., Bartlett, H., Simpson, L. and Dawson, E.
Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A\'s initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full version of this paper is available on the IACR ePrint Archive. |
Cite as: Teo, S., Wong, K. K., Bartlett, H., Simpson, L. and Dawson, E. (2014). Algebraic analysis of Trivium-like ciphers (Poster). In Proc. Twelfth Australasian Information Security Conference (AISC 2014) Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 77-81 |
(from crpit.com)
(local if available)
|
|