Key recovery attack on stream cipher Mir-1 using a key-dependent S-box

1Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

Mir-1 is a stream cipher proposed for Profile 1 at the ECRYPT Stream Cipher Project (eSTREAM). The Mir-1 designer claims a security level of at least 2128, meaning that the secret key cannot be recovered or that the Mir-1 output sequence cannot be distinguished from a truly random number sequence more efficiently than an exhaustive search. At SASC 2006, however, a distinguishing attack on Mir-1 was proposed making use of vulnerabilities in Mir-1 initialization. This paper shows that unknown entries in the key-dependent S-box used by Mir-1 can be classified into partially equivalent pairs by extending the SASC 2006 technique. It also demonstrates an attack that applies that information to recovering the Mir-1 secret key more efficiently than an exhaustive search. To the best of the authors' knowledge, the results described in this paper represent the first successful key recovery attack on Mir-1. © 2008 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tsunoo, Y., Saito, T., Kubo, H., & Suzaki, T. (2008). Key recovery attack on stream cipher Mir-1 using a key-dependent S-box. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5308 LNCS, pp. 128–140). Springer Verlag. https://doi.org/10.1007/978-3-540-88625-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free