ABC v2 is a software-efficient stream cipher with 128-bit key. In this paper, we apply a fast correlation attack to break ABC v2 with weak keys. There are about 296 weak keys in ABC v2. The complexity to identify a weak key and to recover the internal state of a weak key is low: identifying one weak key from about 232 random keys requires 6460 keystream bytes and 213.5 operations for each random key. Recovering the internal state of a weak key requires about 219.5 keystream bytes and 2 32.8 operations. A similar attack can be applied to break ABC v1 with much lower complexity than the previous attack on ABC v1. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Wu, H., & Preneel, B. (2007). Cryptanalysis of the stream cipher ABC v2. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4356 LNCS, pp. 56–66). Springer Verlag. https://doi.org/10.1007/978-3-540-74462-7_5
Mendeley helps you to discover research relevant for your work.