Cryptanalysis of the stream cipher ABC v2

3Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

ABC v2 is a software-efficient stream cipher with 128-bit key. In this paper, we apply a fast correlation attack to break ABC v2 with weak keys. There are about 296 weak keys in ABC v2. The complexity to identify a weak key and to recover the internal state of a weak key is low: identifying one weak key from about 232 random keys requires 6460 keystream bytes and 213.5 operations for each random key. Recovering the internal state of a weak key requires about 219.5 keystream bytes and 2 32.8 operations. A similar attack can be applied to break ABC v1 with much lower complexity than the previous attack on ABC v1. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Wu, H., & Preneel, B. (2007). Cryptanalysis of the stream cipher ABC v2. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4356 LNCS, pp. 56–66). Springer Verlag. https://doi.org/10.1007/978-3-540-74462-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free