Progress in Cryptology – AFRICACRYPT 2008
DOI: 10.1007/978-3-540-68164-9_17
|View full text |Cite
|
Sign up to set email alerts
|

Correlated Keystreams in Moustique

Abstract: Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different functional properties, compared to the other candidates. We present simple related-key phenomena in Moustique that lead to the generation of strongly correlated keystreams and to powerful key-recovery attacks. Our best key-recovery attack requires only 2 38 steps in the related-key scenario. Since the relevance of related-key properties… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…This includes the attack on the self-synchronized stream cipher Moustique [30], the lightweight block cipher KTANTAN [12], and recent improvements upon attacks on 8-rounds of AES-192 and AES-256 [22].…”
Section: What Properties Of the Aes Allowed To Obtain These New Resultsmentioning
confidence: 99%
“…This includes the attack on the self-synchronized stream cipher Moustique [30], the lightweight block cipher KTANTAN [12], and recent improvements upon attacks on 8-rounds of AES-192 and AES-256 [22].…”
Section: What Properties Of the Aes Allowed To Obtain These New Resultsmentioning
confidence: 99%
“…The MITM approach may be seen as a way to turn very strong related-key properties into attacks in the single-key setting, complementing e.g. the work on the self-synchronized stream-cipher Moustique [21]. Even though the time complexity of our attack remains high, optimizations may result in reduced time complexities, by e.g.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…These features make the design of secure self‐synchronizing stream ciphers a difficult task, which also explains the rarity of new proposals. In eSTREAM project, only the ciphers SSS and MOUSTIQUE are self‐synchronizing but both are broken. As stated in , there is little interest in self‐synchronization as they are not supported by the industry today.…”
Section: Stream Cipher Designmentioning
confidence: 99%