Two trivial attacks on TRIVIUM

61Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

TRIVIUM is a stream cipher designed in 2005 by C. De Cannière and B. Preneel for the European project eSTREAM. It has an internal state of 288 bits and the key of length 80 bits. Although the design has a simple and elegant structure, no attack on it has been found yet. In this paper a family of TRIVIUM-like designs is studied. We propose a set of techniques for methodological cryptanalysis of these structures in general, including state recovering and linear distinguishing attacks. In particular, we study the original TRIVIUM and present a state recovering attack with time complexity around c283.8, which is 230 faster than the best previous result. Our attack clearly shows that TRIVIUM has a very thin safety margin and that in its current form it can not be used with longer 128-bit keys. Finally, we identify interesting open problems and propose a new design TRIVIUM/ 128, which resists all of our attacks proposed in this paper. It also accepts a 128 bit secret key due to the improved security level. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Maximov, A., & Biryukov, A. (2007). Two trivial attacks on TRIVIUM. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4876 LNCS, pp. 36–53). Springer Verlag. https://doi.org/10.1007/978-3-540-77360-3_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free