Advertisement

On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2

  • Martin Hell
  • Thomas Johansson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4356)

Abstract

We give a simple algorithm that can find biased linear approximations of nonlinear building blocks. The algorithm is useful if the building block is relatively small and exhaustive search is possible. Instead of searching all possible linear relations individually, we show how the most biased relation can be found in just a few steps. As an example we show how we can find a biased relation in the output bits of the stream cipher Pomaranch Version 2, a tweaked variant of Pomaranch, resulting in both distinguishing and key recovery attacks. These attacks will break both the 128-bit variant and the 80-bit variant of the cipher with complexity faster than exhaustive key search.

Keywords

cryptanalysis linear approximation Pomaranch stream ciphers 

References

  1. 1.
    Cid, C., Gilbert, H., Johansson, T.: Cryptanalysis of Pomaranch. IEE Proceedings - Information Security 153(2), 51–53 (2006)CrossRefGoogle Scholar
  2. 2.
    Cover, T., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunication. Wiley (1991)Google Scholar
  3. 3.
    ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932. Available at http://www.ecrypt.eu.org/stream/
  4. 4.
    Jansen, C.J.A, Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/022Google Scholar
  5. 5.
    Jansen, C.J.A., Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator and Pomaranch stream cipher (version 2). eSTREAM, ECRYPT Stream Cipher Project, Report 2006/006 (2006), http://www.ecrypt.eu.org/stream
  6. 6.
    Jansen, C.J.A, Helleseth, T., Kholosha, A.: Cascade jump controlled sequence generator and Pomaranch stream cipher (version 3). eSTREAM, ECRYPT Stream Cipher Project (2006), http://www.ecrypt.eu.org/stream
  7. 7.
    Jansen, C.J.A., Helleseth, T., Kholosha, A.: Pomaranch - design and analysis of a family of stream ciphers. In: SASC 2006. The State of the Art of Stream Ciphers, Workshop Record, Leuven, Belgium (February 2006)Google Scholar
  8. 8.
    Khazaei, S.: Cryptanalysis of pomaranch (CJCSG). eSTREAM, ECRYPT Stream Cipher Project, Report 2005/065 (2005), http://www.ecrypt.eu.org/stream
  9. 9.
    Maximov, A., Johansson, T.: Fast computation of large distributions and its cryptographic applications. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 313–332. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Martin Hell
    • 1
  • Thomas Johansson
    • 1
  1. 1.Dept. of Information Technology, Lund University, P.O. Box 118, 221 00 LundSweden

Personalised recommendations