Cryptanalysis of Achterbahn-128/80

12Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents two key-recovery attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn80, has complexity 261. The attack against Achterbahn-128 requires 280.58 operations and 260 keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterbahn version 2. They mainly rely on an algorithm that makes profit of the independence of the constituent registers. © International Association for Cryptologic Research 2007.

Cite

CITATION STYLE

APA

Naya-Plasencia, M. (2007). Cryptanalysis of Achterbahn-128/80. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4593 LNCS, pp. 73–86). Springer Verlag. https://doi.org/10.1007/978-3-540-74619-5_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free