New related key attacks on the RAKAPOSHI stream cipher

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

RAKAPOSHI is a hardware oriented stream cipher designed by Cid et al. in 2009. It is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some mistakes existing in the related key attack on RAKAPOSHI by Isobe et al., and propose a new related key attack on RAKAPOSHI, which recovers the 128-bit secret key with a time complexity of 2 56, requiring one related key and 2 55 chosen IVs. Furthermore, an improved key recovery attack on RAKAPOSHI in the multiple related key setting is proposed with a time complexity of 2 33, requiring 2 12.58 chosen IVs. As confirmed by the experimental results, our new attack can recover all 128 key bits of RAKAPOSHI in less than 1.5 hours on a PC.

Cite

CITATION STYLE

APA

Ding, L., Jin, C., Guan, J., Zhang, S., Cui, T., & Zhao, W. (2015). New related key attacks on the RAKAPOSHI stream cipher. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9065, pp. 65–75). Springer Verlag. https://doi.org/10.1007/978-3-319-17533-1_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free