Differential attacks against the helix stream cipher

26Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE'03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks. The first attack requires 288 basic operations and processes only 212 words of chosen plaintext in order to recover the secret key for any length up to 256 bits. However, it assumes the attacker can force nonces to be used twice. Our second attack relies on weaker assumptions. It is a distinguishing attack that detects internal state collisions after 2114 words of chosen plaintext. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Muller, F. (2004). Differential attacks against the helix stream cipher. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3017, 94–108. https://doi.org/10.1007/978-3-540-25937-4_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free