Skip to main content

Attacking Bivium and Trivium with the Characteristic Set Method

  • Conference paper
Progress in Cryptology – AFRICACRYPT 2011 (AFRICACRYPT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6737))

Included in the following conference series:

Abstract

In this paper we utilize an algebraic method called the characteristic set method to attack Bivium and Trivium in the guess-and-determine way. Our attack focuses on recovering the internal states of these two ciphers. We theoretically analyze the performance of different guessing strategies in the guess-and-determine method and present a good one. We show a large amount of experimental results about these two problems with different parameters. From these experimental data we obtain the following results. For Bivium, with 177-bit keystream the expected attack time by the characteristic set method is about 231.81 seconds. And for Trivium, with 288-bit keystream the expected attack time is about 2114.27 seconds.

This work was in part supported by National 973 Program of China under Grant 2011CB302400, the National Natural Science Foundation of China under Grants 60970152 and the Grand Project of Institute of Software under Grant YOCX285056.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chai, F., Gao, X.S., Yuan, C.: A Characteristic Set Method for Solving Boolean Equations and Applications in Cryptanalysis of Stream Ciphers. Journal of Systems Science and Complexity 21(2), 191–208 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  2. De Cannière, C., Preneel, B.: TRIVIUM - a stream cipher construction inspired by block cipher design principles. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/030 (2005)

    Google Scholar 

  3. Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Eibach, T., Pilz, E., Völkel, G.: Attacking Bivium using SAT solvers. In: Kleine Büning, H., Zhao, X. (eds.) SAT 2008. LNCS, vol. 4996, pp. 63–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Eibach, T., Völkel, G.: Optimising Gröbner Bases on Bivium. Mathematics in Computer Science 3(2), 159–172 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236–245. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Gao, X.S., Huang, Z.: Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers. Cryptology ePrint Archive, 2009/637; Accepted by Journal of Symbolic Computation

    Google Scholar 

  8. Maximov, A., Biryukov, A.: Two Trivial Attacks on Trivium. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 36–55. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. McDonald, C., Charnes, C., Pieprzyk, J.: Attacking Bivium with MiniSat. Cryptology ePrint Archive, Report 2007/040 (2007)

    Google Scholar 

  10. Minto, S.: Zero-Sppressed BDDs for Set Manipulation in Combinatorial Problems. In: Proc. ACM/IEEE Design Automation, pp. 272–277. ACM Press, New York (1993)

    Chapter  Google Scholar 

  11. Raddum, H.: Cryptanalytic results on TRIVIUM. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039 (2006)

    Google Scholar 

  12. Wu, W.T.: Basic Principles of Mechanical Theorem-proving in Elementary Geometries. Journal Automated Reasoning 2, 221–252 (1986)

    Article  MATH  Google Scholar 

  13. eSTREAM - The ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Huang, Z., Lin, D. (2011). Attacking Bivium and Trivium with the Characteristic Set Method. In: Nitaj, A., Pointcheval, D. (eds) Progress in Cryptology – AFRICACRYPT 2011. AFRICACRYPT 2011. Lecture Notes in Computer Science, vol 6737. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21969-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21969-6_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21968-9

  • Online ISBN: 978-3-642-21969-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics