Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.4.45

The Related-Key Attack on Grain-v1  

Lee, Yu-Seop (Center for Information Security Technologies, Korea University)
Jung, Ki-Tae (Center for Information Security Technologies, Korea University)
Sung, Jae-Chul (Department of Mathematics, University of Seoul)
Hong, Seok-Hie (Center for Information Security Technologies, Korea University)
Abstract
The slide resynchronization attack on Grain-v1 was proposed in [5]. Given the keystream sequence, this attack can generate the 1-bit shifted keystream sequence generated by Grain-v1. In this paper, extending the attack proposed in [5], we propose the key recovery attack on Grain-v1 using the related-key. Using the weakness of the initialization procedure of Grain-v1, this attack recover the master key with $2^{25.02}$ Ⅳs and $2^{56}$ time complexity. This attack is the first known key recovery attack on Grain-v1.
Keywords
Stream cipher; Grain-v1; Related-key attack; Cryptanalysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Berbain, H. Gilbert and A. Maximov, 'Cryptanalysis of Grain', FSE 2006, LNCS 4047, pp.15-29, SpringerVedag, 2006
2 M. Hell, T. Johansson and W. Meier, 'Grain - A Stream Cipher for Constra ined Environments,' ECRYPT Stream Cipher Project Report 2005/010, 2005. Available at http://www.ecrypt.eu.org/stream/ciphers/grain/grain.pdf
3 O. Kucuk, 'Slide Resynchronization Attack on the Initialization of Grain 1.0', ECRYPT Stream Cipher Project Report 2006/44, 2006. Available at http://www.ecrypt.eu.org/stream/papersdir/2006/ 044.ps
4 S. Khazaei, M. Hassanzadeh and M. Kiaei, 'Distinguishing Attack on Grain', ECRYPT Stream Cipher Project Report 2005/71, 2005. Available at. http://www.ecrypt.eu.org/stream/papersdir/071.pdf
5 M. Hell, T. Johansson and W. Meier, 'Grain - A Stream Cipher for Constrai ned Environments', 2007. Available at http://www.ecrypt.eu.org/stream/p3ciphers/grain/Grain_p3.pdf