Related-key chosen IV attacks on grain-v1 and grain-128

Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

48 Citations (Scopus)

Abstract

The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2 22.59 chosen IVs, 2 26.29-bit keystream sequences and 2 22.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 2 31.39-bit keystream sequences and 2 27.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages321-335
Number of pages15
Volume5107 LNCS
DOIs
Publication statusPublished - 2008 Dec 1
Event13th Australasian Conference on Information Security and Privacy, ACISP 2008 - Wollongong, NSW, Australia
Duration: 2008 Jul 72008 Jul 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5107 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other13th Australasian Conference on Information Security and Privacy, ACISP 2008
CountryAustralia
CityWollongong, NSW
Period08/7/708/7/9

Fingerprint

Attack
Computational complexity
Computational Complexity
Key Recovery
Initialization
Recovery

Keywords

  • Cryptanalysis
  • Grain-128
  • Grain-v1
  • Related-key chosen IV attack
  • Stream cipher

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Lee, Y., Jeong, K., Sung, J., & Hong, S. (2008). Related-key chosen IV attacks on grain-v1 and grain-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5107 LNCS, pp. 321-335). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5107 LNCS). https://doi.org/10.1007/978-3-540-70500-0-24

Related-key chosen IV attacks on grain-v1 and grain-128. / Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5107 LNCS 2008. p. 321-335 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5107 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, Y, Jeong, K, Sung, J & Hong, S 2008, Related-key chosen IV attacks on grain-v1 and grain-128. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 5107 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5107 LNCS, pp. 321-335, 13th Australasian Conference on Information Security and Privacy, ACISP 2008, Wollongong, NSW, Australia, 08/7/7. https://doi.org/10.1007/978-3-540-70500-0-24
Lee Y, Jeong K, Sung J, Hong S. Related-key chosen IV attacks on grain-v1 and grain-128. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5107 LNCS. 2008. p. 321-335. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-70500-0-24
Lee, Yuseop ; Jeong, Kitae ; Sung, Jaechul ; Hong, Seokhie. / Related-key chosen IV attacks on grain-v1 and grain-128. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5107 LNCS 2008. pp. 321-335 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{1387d1650b5d493baf3b2ae14f800fcf,
title = "Related-key chosen IV attacks on grain-v1 and grain-128",
abstract = "The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2 22.59 chosen IVs, 2 26.29-bit keystream sequences and 2 22.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 2 31.39-bit keystream sequences and 2 27.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.",
keywords = "Cryptanalysis, Grain-128, Grain-v1, Related-key chosen IV attack, Stream cipher",
author = "Yuseop Lee and Kitae Jeong and Jaechul Sung and Seokhie Hong",
year = "2008",
month = "12",
day = "1",
doi = "10.1007/978-3-540-70500-0-24",
language = "English",
isbn = "3540699716",
volume = "5107 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "321--335",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Related-key chosen IV attacks on grain-v1 and grain-128

AU - Lee, Yuseop

AU - Jeong, Kitae

AU - Sung, Jaechul

AU - Hong, Seokhie

PY - 2008/12/1

Y1 - 2008/12/1

N2 - The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2 22.59 chosen IVs, 2 26.29-bit keystream sequences and 2 22.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 2 31.39-bit keystream sequences and 2 27.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

AB - The slide resynchronization attack on Grain was proposed in [6]. This attack finds related keys and initialization vectors of Grain that generate the 1-bit shifted keystream sequence. In this paper, we extend the attack proposed in [6] and propose related-key chosen IV attacks on Grain-v1 and Grain-128. The attack on Grain-v1 recovers the secret key with 2 22.59 chosen IVs, 2 26.29-bit keystream sequences and 2 22.90 computational complexity. To recover the secret key of Grain-128, our attack requires 2 26.59 chosen IVs, 2 31.39-bit keystream sequences and 2 27.01 computational complexity. These works are the first known key recovery attacks on Grain-v1 and Grain-128.

KW - Cryptanalysis

KW - Grain-128

KW - Grain-v1

KW - Related-key chosen IV attack

KW - Stream cipher

UR - http://www.scopus.com/inward/record.url?scp=70349858082&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349858082&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-70500-0-24

DO - 10.1007/978-3-540-70500-0-24

M3 - Conference contribution

AN - SCOPUS:70349858082

SN - 3540699716

SN - 9783540699712

VL - 5107 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 321

EP - 335

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -