Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security 2006
DOI: 10.1145/1128817.1128859
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the "Grain" family of stream ciphers

Abstract: Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f (x). The function g(x) is a Boolean function on the state of the NLFSR and the LFSR, at any time instance t. Whenever the LFSR has good statistical properties, it is used for controlling the randomness of the NLFSR's state machine. In this paper we define and study the general class of "Grain" family of stream ciphers, where the keystream bits are generated by another Boolean function h(y) on the states of the NLF… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…Linear Approximations. In [30] it is explained how to find a time-invariant biased linear relation between the LFSR bits and the keystream bits for Grain family of stream ciphers. This bias depends on the nonlinearity and the resiliency of the NLFSR update and of the output functions.…”
Section: Security Discussionmentioning
confidence: 99%
“…Linear Approximations. In [30] it is explained how to find a time-invariant biased linear relation between the LFSR bits and the keystream bits for Grain family of stream ciphers. This bias depends on the nonlinearity and the resiliency of the NLFSR update and of the output functions.…”
Section: Security Discussionmentioning
confidence: 99%
“…The Grain stream cipher [17,18] uses this structure to produce keystream output bits. Some security analyses have been published in [2,21,9]. Figure 3 shows the structure of the design, which combines a LF-NLFSR with a filter generator.…”
Section: Lf-nlfsr and Lfsrmentioning
confidence: 99%
“…For example, a (4, k)-NLFSR going through the following 16 states: 1, 3, 0, 2, 8,5,7,6,9,11,4,10,14,13,15,12 generates the output sequence 1100011011000110 which has the period 8. For the Fibonacci type of NLFSRs, the period is always equal to the length of the longest cycle of states.…”
Section: Relation Between the Length Of The Longest Cycle Ofmentioning
confidence: 99%
“…A number of different implementations of NLFSRbased stream ciphers for RFID and smartcards applications have been proposed, including Achterbahn [12], Grain [13], [14], KeeLoq [15], Trivium [16], VEST [17], and [18]. NLFSRs have been shown to be more resistant to cryptanalytic attacks than LFSRs [19], [20].…”
Section: Introductionmentioning
confidence: 99%