2013
DOI: 10.1109/tifs.2013.2256419
|View full text |Cite
|
Sign up to set email alerts
|

Related Key Chosen IV Attack on Grain-128a Stream Cipher

Abstract: The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Ågren, Hell, Johansson, and Meier. The designers claimed that Grain-128a is strengthened against all known attacks and observations on the original G… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…There are weaknesses in the initialization procedure of all members of the Grain family [ 4 , 14 ] and Sprout [ 18 , 33 ]. Designers of Plantlet ruled out the related-key attacks.…”
Section: The Resistance To Known Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…There are weaknesses in the initialization procedure of all members of the Grain family [ 4 , 14 ] and Sprout [ 18 , 33 ]. Designers of Plantlet ruled out the related-key attacks.…”
Section: The Resistance To Known Attacksmentioning
confidence: 99%
“…Grain-128a was proposed in 2011 [ 12 ]. Although some attacks have been applied to Grain-128a [ 13 , 14 ], it is still good from the practical point of view.…”
Section: Introductionmentioning
confidence: 99%
“…These winners are HC-128 [8], Salsa20/12 [9], Rabbit [10] and SOSEMANUK [11] in profile 1 (software-oriented Ciphers) and Grain v1 [12], MICKEY 2.0 [13] and Trivium [14] in profile 2 (hardware oriented cipher). Even after these standardisation efforts, several weaknesses were found in these ciphers [15][16][17][18]. Therefore, it is necessary to make a large amount of effort toward the invention of new replacement schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, the idea to exploit a weakness of an initialization algorithm by utilizing the slide property is not new, and has been applied to some stream ciphers, e.g. Grain v1 [26], [27], Grain-128a [28], [29], Decim v2 [30], RAKAPOSHI [31], [32]. These results show that the slide property is a very useful tool to evaluate the security of stream ciphers.…”
Section: Introductionmentioning
confidence: 99%