Related-key chosen IV attacks on grain-v1 and grain-128

Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)


The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 222.59 chosen IVs, 226.29-bit keystream sequences and 222.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 231.39-bit keystream sequences and 227.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings
PublisherSpringer Verlag
Number of pages15
ISBN (Print)3540699716, 9783540699712
Publication statusPublished - 2008
Event13th Australasian Conference on Information Security and Privacy, ACISP 2008 - Wollongong, NSW, Australia
Duration: 2008 Jul 72008 Jul 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5107 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other13th Australasian Conference on Information Security and Privacy, ACISP 2008
CityWollongong, NSW

Bibliographical note

Funding Information:
This research was supported by the MKE(Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2008-(C1090-0801-0025)).


  • Cryptanalysis
  • Grain-128
  • Grain-v1
  • Related-key chosen IV attack
  • Stream cipher

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Related-key chosen IV attacks on grain-v1 and grain-128'. Together they form a unique fingerprint.

Cite this