Abstract
Mir-1 is a stream cipher proposed for Profile 1 at the ECRYPT Stream Cipher Project (eSTREAM). The Mir-1 designer claims a security level of at least 2128, meaning that the secret key cannot be recovered or that the Mir-1 output sequence cannot be distinguished from a truly random number sequence more efficiently than an exhaustive search. At SASC 2006, however, a distinguishing attack on Mir-1 was proposed making use of vulnerabilities in Mir-1 initialization. This paper shows that unknown entries in the key-dependent S-box used by Mir-1 can be classified into partially equivalent pairs by extending the SASC 2006 technique. It also demonstrates an attack that applies that information to recovering the Mir-1 secret key more efficiently than an exhaustive search. To the best of the authors’ knowledge, the results described in this paper represent the first successful key recovery attack on Mir-1.
Chapter PDF
Similar content being viewed by others
References
Anashin, V., Bogdanov, A., Kizhvatov, I., Kumar, S.: ABC: A New Fast Flexible Stream Cipher. eSTREAM submission (2005)
Crowley, P.: Mercy: A Fast Large Block Cipher for Disk Sector Encryption. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 49–63. Springer, Heidelberg (2001)
Cusick, T.W., Wood, M.C.: The REDOC II Cryptosystem. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 545–563. Springer, Heidelberg (1991)
ECRYPT Stream Cipher Project (eSTREAM), http://www.ecrypt.eu.org/stream/
European Network of Excellence for Cryptology (ECRYPT), http://www.ecrypt.eu.org/
Halevi, S., Coppersmith, D., Jutla, C.S.: Scream: A Software-Efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)
Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive Specification for SSS. eSTREAM submission (2005)
Klimov, A., Shamir, A.: New Cryptographic Primitives Based on Multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 1–15. Springer, Heidelberg (2004)
Li, A.-P.: A New Stream Cipher: Dicing. eSTREAM submission (2005)
Maximov, A.: A New Stream Cipher “Mir-1”. eSTREAM submission (2005)
McGrew, D.A., Fluhrer, S.R.: The Stream Cipher LEVIATHAN. NESSIE submission (2000)
Merkle, R.C.: Fast Software Encryption Functions. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 476–501. Springer, Heidelberg (1991)
National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) 197, Advanced Encryption Standard (AES)
New European Schemes for Signature, Integrity, and Encryption (NESSIE), https://www.cosic.esat.kuleuven.be/nessie/
Rose, G.G., Hawkes, P.: Turing: A Fast Stream Cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 290–306. Springer, Heidelberg (2003)
Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. NIST AES proposal (1998)
Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M.: Cryptanalysis of Mir-1, a T-function Based Stream Cipher. In: Proceedings of SASC 2006, pp. 185–197 (2006), http://www.ecrypt.eu.org/stvl/sasc2006/
Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T.: Cryptanalysis of Mir-1: A T-function-Based Stream Cipher. IEEE Transactions on Information Theory 53(11), 4377–4383 (2007)
Wu, H.: A New Stream Cipher HC-256. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 226–244. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T. (2008). Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. In: Chen, L., Ryan, M.D., Wang, G. (eds) Information and Communications Security. ICICS 2008. Lecture Notes in Computer Science, vol 5308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88625-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-88625-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88624-2
Online ISBN: 978-3-540-88625-9
eBook Packages: Computer ScienceComputer Science (R0)