In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE'03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks. The first attack requires 288 basic operations and processes only 212 words of chosen plaintext in order to recover the secret key for any length up to 256 bits. However, it assumes the attacker can force nonces to be used twice. Our second attack relies on weaker assumptions. It is a distinguishing attack that detects internal state collisions after 2114 words of chosen plaintext. © International Association for Cryptologic Research 2004.
CITATION STYLE
Muller, F. (2004). Differential attacks against the helix stream cipher. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3017, 94–108. https://doi.org/10.1007/978-3-540-25937-4_7
Mendeley helps you to discover research relevant for your work.