Conditional differential cryptanalysis of 105 round Grain v1

Subhadeep Banik

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

In this paper we propose conditional differential cryptanalysis of 105 round Grain v1. This improves the attack proposed on 97 round Grain v1 by Knellwolf et al at Asiacrypt 2010. We take the help of the tool ΔGrain KSA, to track the differential trails introduced in the internal state of Grain v1 by any difference in the IV bits. We prove that a suitably introduced difference in the IV leads to a distinguisher for the output bit produced in the 105th round. This helps determine the values of 6 expressions in the Secret Key bits. Using the above attack as a subroutine, we propose a method that determines 9 Secret Key bits explicitly. Thus, the complexity for the Key recovery is proportional to 271 operations, which is faster than exhaustive search by 29.
Original languageEnglish
JournalCryptography and Communications
Volume8
Issue number1
Pages (from-to)113-137
ISSN1936-2447
DOIs
Publication statusPublished - 2016

Keywords

  • EStream
  • Differential cryptanalysis
  • Dynamic cube attack
  • Grain v1
  • Stream cipher

Fingerprint

Dive into the research topics of 'Conditional differential cryptanalysis of 105 round Grain v1'. Together they form a unique fingerprint.

Cite this