Related-key chosen IV attacks on grain-v1 and grain-128

Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

62 Scopus citations

Abstract

The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 222.59 chosen IVs, 226.29-bit keystream sequences and 222.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 231.39-bit keystream sequences and 227.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings
PublisherSpringer Verlag
Pages321-335
Number of pages15
ISBN (Print)3540699716, 9783540699712
DOIs
StatePublished - 2008
Event13th Australasian Conference on Information Security and Privacy, ACISP 2008 - Wollongong, NSW, Australia
Duration: 7 Jul 20089 Jul 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5107 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th Australasian Conference on Information Security and Privacy, ACISP 2008
Country/TerritoryAustralia
CityWollongong, NSW
Period7/07/089/07/08

Keywords

  • Cryptanalysis
  • Grain-128
  • Grain-v1
  • Related-key chosen IV attack
  • Stream cipher

Fingerprint

Dive into the research topics of 'Related-key chosen IV attacks on grain-v1 and grain-128'. Together they form a unique fingerprint.

Cite this