Abstract
Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on a short-term bias in the first two bytes of a keystream and a long-term bias in the first two bytes of every cycle of N keystream bytes, where N is the size of the internal permutation. Our attacks are able to distinguish a keystream of the full Spritz from a random sequence with samples of first two bytes produced by 244.8 multiple key-IV pairs or 260.8 keystream bytes produced by a single key- IV pair. These biases are also useful in the event of plaintext recovery in a broadcast attack. In the second part of the paper, we look at a state recovery attack on Spritz, in a special situation when the cipher enters a class of weak states. We determine the probability of encountering such a state, and demonstrate a state recovery algorithm that betters the 21400 step algorithm of Ankele et al. at Latincrypt 2015.
Original language | English |
---|---|
Title of host publication | Revised Selected Papers of the 23rd International Conference on Fast Software Encryption (FSE 2016) |
Publisher | Springer |
Publication date | 2016 |
Pages | 63-77 |
ISBN (Print) | 978-3-662-52992-8 |
ISBN (Electronic) | 978-3-662-52993-5 |
DOIs | |
Publication status | Published - 2016 |
Event | 23rd International Conference on Fast Software Encryption (FSE 2016) - Bochum, Germany Duration: 20 Mar 2016 → 23 Mar 2016 Conference number: 23 https://fse.rub.de/ |
Conference
Conference | 23rd International Conference on Fast Software Encryption (FSE 2016) |
---|---|
Number | 23 |
Country/Territory | Germany |
City | Bochum |
Period | 20/03/2016 → 23/03/2016 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 9783 |
ISSN | 0302-9743 |
Keywords
- RC4
- Spritz
- Stream cipher
- Short-term bias
- Long-term bias
- Distinguishing attack
- Plaintext recovery attack
- State recovery attack