Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-77026-8_6
|View full text |Cite
|
Sign up to set email alerts
|

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses

Abstract: The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py6 were discovered. One main contribution of the paper is the detection of related-key weaknesses in the Py-family of ciphers including the strongest member TPypy. Under related keys, we show a distinguishing attack on TPypy with data complexity 2 193.7 which is lower than the previous best known attack on the cipher by a factor of 2 8… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…Related-key attack is wide range of applications in block cipher, but is rarely applied in stream cipher. The existing results are applied in RC4 and Py Series of stream ciphers [3,4]. In ACISP2008, Yuseop Lee et al [5] combined related-key attack with chosen IV attacks and applied this new attack on Grain v1 and Grain-128.…”
Section: Introductionmentioning
confidence: 97%
“…Related-key attack is wide range of applications in block cipher, but is rarely applied in stream cipher. The existing results are applied in RC4 and Py Series of stream ciphers [3,4]. In ACISP2008, Yuseop Lee et al [5] combined related-key attack with chosen IV attacks and applied this new attack on Grain v1 and Grain-128.…”
Section: Introductionmentioning
confidence: 97%
“…Application of related-key attacks to stream ciphers was not very common in the literature, mainly due to the heavy operations executed in one-time key-scheduling algorithms com- pared to the operations performed in iterative block ciphers, see [7]. However, there is a growing tendency by cryptanalysts nowadays to attack stream ciphers using related key attacks.…”
Section: Introductionmentioning
confidence: 97%
“…However, there is a growing tendency by cryptanalysts nowadays to attack stream ciphers using related key attacks. Sekar, Paul and Preneel [7] presented related-key weaknesses in the Py-family of ciphers including the strongest member TPypy. The result had been improved significantly by Ding and Guan in [8].…”
Section: Introductionmentioning
confidence: 98%
“…It transforms a 16-byte master key into an 8-byte block of output at a time. The main cryptanalytic result [8] obtained on TWOPRIME so far is the analysis 1 In the literature, there have been several examples of the application for the related-key attack on stream ciphers [15,41], however, no general framework of related-key attack on stream ciphers has been published. exploiting structural weaknesses of TWOPRIME.…”
Section: Introductionmentioning
confidence: 99%