Related-key chosen IV attacks on grain-v1 and grain-128

Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)

    Abstract

    The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 222.59 chosen IVs, 226.29-bit keystream sequences and 222.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 231.39-bit keystream sequences and 227.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

    Original languageEnglish
    Title of host publicationInformation Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings
    PublisherSpringer Verlag
    Pages321-335
    Number of pages15
    ISBN (Print)3540699716, 9783540699712
    DOIs
    Publication statusPublished - 2008
    Event13th Australasian Conference on Information Security and Privacy, ACISP 2008 - Wollongong, NSW, Australia
    Duration: 2008 Jul 72008 Jul 9

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume5107 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other13th Australasian Conference on Information Security and Privacy, ACISP 2008
    Country/TerritoryAustralia
    CityWollongong, NSW
    Period08/7/708/7/9

    Bibliographical note

    Funding Information:
    This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2008-(C1090-0801-0025)).

    Keywords

    • Cryptanalysis
    • Grain-128
    • Grain-v1
    • Related-key chosen IV attack
    • Stream cipher

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Related-key chosen IV attacks on grain-v1 and grain-128'. Together they form a unique fingerprint.

    Cite this