2007
DOI: 10.1109/tit.2007.907340
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher

Abstract: This paper describes the cryptanalysis of Mir-1, a T-function based stream cipher proposed at eSTREAM (the ECRYPT Stream Cipher Project) in 2005. It uses a multiword T-function, with four 64-bit words, as its basic structure. Mir-1 operations process the data in every 64 bits (one word) to generate a keystream. This paper discusses a distinguishing attack against Mir-1, one that exploits the T-function characteristics and the Mir-1 initialization. With merely three or four IV pairs, this attack can distinguish… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…If d is large enough, an adversary can distinguish keystream bits from random bit sequences. For example d is suAEciently large for 7-round Salsa20 to distinguish keystream bits [22]. We propose a double-bit distinguisher for 9-round Salsa20 and 8-round ChaCha in the later section.…”
Section: Construction Of Distinguishermentioning
confidence: 99%
See 3 more Smart Citations
“…If d is large enough, an adversary can distinguish keystream bits from random bit sequences. For example d is suAEciently large for 7-round Salsa20 to distinguish keystream bits [22]. We propose a double-bit distinguisher for 9-round Salsa20 and 8-round ChaCha in the later section.…”
Section: Construction Of Distinguishermentioning
confidence: 99%
“…The best attack is proposed by Aumasson et al [22] so far, and it covers the 8-round version of Salsa20 with an estimated complexity of 2 251 . Regarding the 128-bit key, Aumasson proposed key-recovery attacks for reduced versions with up to 7 rounds [22].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…During last few years, there have been many efforts [40,29,8] on the modification of RC4 towards further improvement and there also exist distinguishing attacks on them [20,36,37]. This shows that there is significant interest in the cryptographic community for analysis and design of RC4 and its modifications.…”
Section: Introductionmentioning
confidence: 99%