Abstract
We present an attack on the ORYX stream cipher that requires only 25-27 bytes of known plaintext and has time complexity of 216. This attack directly recovers the full 96 bit internal state of ORYX, regardless of the key schedule. We also extend these techniques to show how to break ORYX even under a ciphertext-only model. As the ORYX cipher is used to encrypt the data transmissions in the North American Cellular system, these results are further evidence that many of the encryption algorithms used in second generation mobile communications offer a low level of security.
Chapter PDF
References
E. Dawson and L. Nielsen. Automated cryptanalysis of XOR plaintext strings. Cryptologia, volume XX Number 2, pages 165–181. April 1996.
B. Goldburg, E. Dawson and S. Sridharan. The automated cryptanalysis of analog speech scramblers. Advances in Cryptology-EUROCRYPT’91, volume 547 of Lecture Notes in Computer Science, pages 422–430. Springer-Verlag, 1991.
M. Briceno, I. Goldberg and D. Wagner. GSM cloning. 20 April, 1998. http://www.isaac.cs.berkeley.edu/isaac/gsm.htm
J. Dj. Golić. Cryptanalysis of alleged A5 stream cipher. Advances in Cryptology-EUROCRYPT’97, volume 1233 of Lecture Notes in Computer Science, pages 239–255. Springer-Verlag, 1997.
H. Schildt. C the Complete Reference Osborne McGraw-Hill, Berkeley, CA, 1990.
TIA TR45.0.A, Common Cryptographic Algorithms June 1995, Rev B.
D. Wagner, B. Schneier and J. Kelsey. Cryptanalysis of the cellular message encryption algorithm. Advances in Cryptology-CRYPTO’97, volume 1294 of Lecture Notes in Computer Science, pages 526–537. Springer-Verlag, 1997.
D. Wagner, B. Schneier and J. Kelsey. Cryptanalysis of ORYX. unpublished manuscript, 4 May 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wagner, D., Simpson, L., Dawson, E., Kelsey, J., Millan, W., Schneier, B. (1999). Cryptanalysis of ORYX. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_23
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive