Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Algebraic cryptanalysis of a small-scale version of stream cipher Lex

Algebraic cryptanalysis of a small-scale version of stream cipher Lex

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the authors analyse with respect to algebraic attacks a small-scale version of the stream cipher Lex. They base it on a small-scale version of the block cipher advanced encryption standard (AES) with 16-bit state and 16-bit key. They represent the small-scale Lex and its key schedule in two alternative ways: as a system of cubic boolean equations and as a system of quadratic boolean equations. The authors use Gröbner bases to solve the two systems for different number of rounds and sizes of the leak. They obtain the best results for the quadratic representation of the cipher. For this case they are able to recover the secret key in time less than 2 min by solving a system of 374 quadratic boolean equations in 208 unknowns resulting from 5 rounds of the cipher.

References

    1. 1)
      • Biryukov, A.: `The tweak for Lex-128, Lex-192, Lex-256; Lex (Phase 2)', Report 2006/037, , eSTREAM, ECRYPT Stream Cipher Project.
    2. 2)
      • Bardet, M., Faugere, J.C., Salvy, B.: `On the complexity of Gröbner basis computation of semi-regular overdetermined sequences over F2 with solutions in F2', December 2003, p. 19, Rapport de recherche de l'INRIA.
    3. 3)
      • Brickenstein, M., Dreyer, A.: `PolyBoRi: A framework for Gröbner basis computations with Boolean polynomials', Electronic Proc. MEGA 2007 – Effective Methods in Algebraic Geometry, June 2007, Strobl, Austria.
    4. 4)
      • Englund, H., Hell, M., Johansson, T.: `A note on distinguishing attacks, information theory for wireless networks', 2007 IEEE Information Theory Workshop, 1–6 July 2007, 4047, p. 1–4.
    5. 5)
      • J. Daemen , V. Rijmen . (2002) The design of Rijndael: AES – the advanced encryption standard.
    6. 6)
      • O. Dunkelman , N. Keller . A new attack on the Lex stream cipher. ASIACRYPT , 539 - 556
    7. 7)
      • A. Biryukov , C. De Canniere . Block ciphers and systems of quadratic equations. FSE , 274 - 289
    8. 8)
      • B. Preneel , H. Wu . Resynchronization attacks on WG and Lex. FSE , 422 - 432
    9. 9)
      • Biryukov, A.: `A new 128-bit key stream cipher Lex', Report 2005/013, , eSTREAM, ECRYPT Stream Cipher Project.
    10. 10)
      • Bardet, M., Faugere, J.C., Salvy, B.: `On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations', Proc. Int. Conf. on Polynomial System Solving, 2004, p. 71–74.
    11. 11)
      • B. Buchberger . An algorithmical criterion for the solvability of algebraic systems of equations. Aequationes Math. , 3 , 374 - 383
    12. 12)
      • Courtois, N., Pieprzyk, J.: `Cryptanalysis of block ciphers with overdefined systems of equations', ASIACRYPT, 2002, p. 267–287.
    13. 13)
      • S. William . (2008) Sage: Open source mathematical software (Version 3.1.4).
    14. 14)
      • Daemen, J., Rijmen, V.: `AES proposal: Rijndael', NIST AES proposal, 1998.
    15. 15)
      • A. Biryukov . The design of a stream cipher Lex. Sel. Areas Cryptogr. , 67 - 75
    16. 16)
      • M. Albrecht . Algebraic attacks on the Courtois Toy cipher. J. Cryptol. , 3 , 220 - 276
    17. 17)
      • C. Cid , S. Murphy , M.J.B. Robshaw . Small scale variants of the AES. FSE , 145 - 162
    18. 18)
      • J. Buchmann , A. Pyshkin , R.-P. Weinmann . Block ciphers sensitive to Gröbner basis attacks. CT-RSA , 313 - 331
    19. 19)
      • Z'aba, R.M., Raddum, H., Simpson, L., Dawson, E., Henricksen, M., Wong, K.: `Algebraic analysis of Lex', Proc. Seventh Australasian Information Security Conf. AISC 2009, Wellington, New Zealand, p. 33–45, CRPIT, 98, (Brankovic, L., Susilo, W. Eds).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0118
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0118
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address