2020
DOI: 10.1093/comjnl/bxaa154
|View full text |Cite
|
Sign up to set email alerts
|

Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher

Abstract: The K2 stream cipher, designed for 32-bit words, is an ISO/IEC 18033 standard and is listed as a recommended algorithm used by the Japanese government in the CRYPTREC project. The main feature of the K2 algorithm is the use of a dynamic feedback control mechanism between the two linear feedback shift registers, which makes the analysis of the K2 algorithm more difficult. In this paper, for its simplified version algorithm, a key recovery attack is performed by using differential attacks. Firstly, for the unkno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…Taking into account the positive world experience of cryptographic competitions CRYPTREC [13], NESSIE [14], AES [15] and SHA3 [16], the State Service for Special Communications and Data Protection of Ukraine successfully held a national open competition of symmetric block cryptographic algorithms in 2007-2010 [17], which defeated the algorithm "Kalyna" [18], Kharkiv developers of the Institute of Information Technology [19], on the basis of which the national standard of Ukraine was developed [20]. As it has been described above, the new algorithm should provide greater cryptographic transformation speed compared to the AES algorithm [5], as well as have a higher level of stability against AES [5].…”
Section: Analysis Of Recent Research and Publicationsmentioning
confidence: 99%
“…This converts the deterministic linear recurrence of some registers into a probabilistic recurrence. However, key recovery attacks on K2 and A5 have been reported in literature ( [23])( [24]).…”
Section: Introductionmentioning
confidence: 99%