Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.6.3

Related-Key Differential Attacks on the Block-wise Stream Cipher TWOPRIME  

Kim, Gu-Il (CIST, Korea University)
Sung, Jae-Chul (Department of Mathematics, University of Seoul)
Hong, Seok-Hie (CIST, Korea University)
Lim, Jong-In (CIST, Korea University)
Kim, Jong-Sung (CIST, Korea University)
Abstract
In this paper we present related-key differential attacks on the block-wise stream cipher TWOPRIME. We construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of $2^{14}$ known plaintext blocks and a time complexity of $2^{38}$ 8-bit table lookups.
Keywords
Stream Ciphers; Related-key differential attacks; TWOPRIME;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Jakimoski, Y. Desmedt, 'Related-Key Differential Cryptanalysis of 192-bit Key AES Variants', SAC'03, LNCS 3006, Springer-Verlag, pp. 208-221, 2004
2 N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, T. Kohno, 'Helix: Fast encryption and authentication in a single cryptographic primitive',The 10th Fast Software Encryption Workshop(FSE 2003), LNCS 2887, Springer-Verlag, pp. 330-346, 2003
3 M. Blunden, A. Escott, 'Related Key Attacks on Reduced Round KASUMI',The 8th Fast Software Encryption Workshop(FSE 2001), LNCS 2355, Springer-Verlag, pp. 277-285, 2001
4 W. Meier, O. Staffelbach, 'Fast correlation attacks on certain stream ciphers', Journal of Cryptology, 1(3), pp. 159-176, 1989   DOI
5 J. Daemen, V. Rijndael, 'The Rijndael block cipher', AES proposal, 1998
6 C. Ding, V. Niemi, A. Renvall, A. Salomaa, 'TWOPRIME: A fast stream ciphering algorithm', The 4th Fast Software Encryption Workshop(FSE 1997), LNCS 1267, Springer-Verlag, pp. 88-102, 1997
7 D. Coppersmith, D. Wagner, B. Schneier, J. Kelsey, 'Cryptanalysis of TWOPRIME' The 5th Fast Software Encryption Workshop(FSE 1998), LNCS 1372, Springer-Verlag, pp. 32-48, 1998
8 J. Kelsey, B. Schneir, D. Wagner, 'Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA', Advances in Cryptology - ICICS'97, LNCS 1334, pp. 233-246, Springer-Verlag, 1997
9 J. Kelsey, B. Schneier, D. Wagner, 'Key-schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES',Advances in Cryptology - CRYPTO'96, LNCS 1109, Springer-Verlag, pp. 237-251, 1996
10 E. Biham, 'New Types of Cryptanalytic Attack Using Related Keys', Journal of Cryptology, Vol. 7, No. 4, pp. 156-171, 1994