Advertisement

New Related Key Attacks on the RAKAPOSHI Stream Cipher

  • Lin DingEmail author
  • Chenhui Jin
  • Jie Guan
  • Shaowu Zhang
  • Ting Cui
  • Wei Zhao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9065)

Abstract

RAKAPOSHI is a hardware oriented stream cipher designed by Cid et al. in 2009. It is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some mistakes existing in the related key attack on RAKAPOSHI by Isobe et al., and propose a new related key attack on RAKAPOSHI, which recovers the 128-bit secret key with a time complexity of 256, requiring one related key and 255 chosen IVs. Furthermore, an improved key recovery attack on RAKAPOSHI in the multiple related key setting is proposed with a time complexity of 233, requiring 212.58 chosen IVs. As confirmed by the experimental results, our new attack can recover all 128 key bits of RAKAPOSHI in less than 1.5 hours on a PC.

Keywords

Cryptanalysis Related key attack RAKAPOSHI Stream cipher 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    New European Schemes for Signatures, Integrity, and Encryption, http://www.cryptonessie.org (accessed August 18, 2003)
  2. 2.
    ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932, http://www.ecrypt.eu.org/stream/ (accessed September 29, 2005)
  3. 3.
    Cid, C., Kiyomoto, S., Kurihara, J.: The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 32–46. Springer, Heidelberg (2009)Google Scholar
  4. 4.
    Beth, T., Piper, F.: The Stop-and-Go Generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 88–92. Springer, Heidelberg (1985)Google Scholar
  5. 5.
    Simpson, L.R., Dawson, E., Golić, J.D., Millan, W.L.: LILI Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 248–261. Springer, Heidelberg (2001)Google Scholar
  6. 6.
    Horan, D., Guinee, R.: A Novel Keystream Generator using Pseudo Random Binary Sequences for Cryptographic Applications. In: Proceedings of Irish Signals and Systems Conference, pp. 451–456. IEEE (2006)Google Scholar
  7. 7.
    Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In: Proceedings of SECRYPT 2007, pp. 204–213 (2007)Google Scholar
  8. 8.
    Isobe, T., Ohigashi, T., Morii, M.: Slide cryptanalysis of lightweight stream cipher RAKAPOSHI. In: Hanaoka, G., Yamauchi, T. (eds.) IWSEC 2012. LNCS, vol. 7631, pp. 138–155. Springer, Heidelberg (2012)Google Scholar
  9. 9.
    Orumiehchiha, M.A., Pieprzyk, J., Shakour, E., Steinfeld, R.: Security Evaluation of Rakaposhi Stream Cipher. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 361–371. Springer, Heidelberg (2013)Google Scholar
  10. 10.
    Ding, L., Guan, J.: Cryptanalysis of RAKAPOSHI Stream Cipher, Cryptology ePrint Archive Report 2012/696, http://eprint.iacr.org/

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Lin Ding
    • 1
    Email author
  • Chenhui Jin
    • 1
  • Jie Guan
    • 1
  • Shaowu Zhang
    • 1
  • Ting Cui
    • 1
  • Wei Zhao
    • 2
  1. 1.Information Science and Technology InstituteZhengzhouChina
  2. 2.Science and Technology on Communication Security LaboratoryChengduChina

Personalised recommendations