用户名: 密码: 验证码:
Related key chosen IV attacks on Decim v2 and Decim-128
详细信息    查看全文
文摘
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et?al. and has been submitted to eSTREAM. Decim v2 is a revised version of Decim v1 and was submitted to ISO/IEC 18033-4. Decim-128 is a 128-bit security version of Decim. In this paper, we propose related key chosen IV attacks on Decim v2 and Decim-128. The attacks on Decim v2 and Decim-128 can recover the 80-bit and 128-bit secret keys with computational complexity of 268/296, requiring 220/251 chosen IVs, 226/256.88-bit stream sequence and negligible/ 242.58 bits space, respectively. When more than 8 and 10 related keys can be obtained for Decim v2 and Decim-128, the computational complexity can be reduced to 232/238, requiring 223/233.32 chosen IVs, 229/239.25-bit stream sequence and negligible/ 230.91 bits space, respectively. These results have been the best key recovery attacks on Decim v2 and Decim-128.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700