Attacking Bivium and Trivium with the characteristic set method

18Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we utilize an algebraic method called the characteristic set method to attack Bivium and Trivium in the guess-and-determine way. Our attack focuses on recovering the internal states of these two ciphers. We theoretically analyze the performance of different guessing strategies in the guess-and-determine method and present a good one. We show a large amount of experimental results about these two problems with different parameters. From these experimental data we obtain the following results. For Bivium, with 177-bit keystream the expected attack time by the characteristic set method is about 231.81 seconds. And for Trivium, with 288-bit keystream the expected attack time is about 2114.27 seconds. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Huang, Z., & Lin, D. (2011). Attacking Bivium and Trivium with the characteristic set method. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6737 LNCS, pp. 77–91). https://doi.org/10.1007/978-3-642-21969-6_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free