• DocumentCode
    34809
  • Title

    Related Key Chosen IV Attack on Grain-128a Stream Cipher

  • Author

    Ding, Lixin ; Guan, Junzhi

  • Author_Institution
    Information Science and Technology Institute, Zhengzhou, China
  • Volume
    8
  • Issue
    5
  • fYear
    2013
  • fDate
    May-13
  • Firstpage
    803
  • Lastpage
    809
  • Abstract
    The well-known stream cipher Grain-128 is a variant version of Grain v1 with 128-bit secret key. Grain v1 is a stream cipher which has successfully been chosen as one of seven finalists by European eSTREAM project. Yet Grain-128 is vulnerable against some recently introduced attacks. A new version of Grain-128 with authentication, named Grain-128a, is proposed by Ågren, Hell, Johansson, and Meier. The designers claimed that Grain-128a is strengthened against all known attacks and observations on the original Grain-128. So far there exists no attack on Grain-128a except a differential fault attack by Banik, Maitra, and Sarkar. In this paper, we give some observations on Grain-128a, and then propose a related key chosen IV attack on Grain-128a based on these observations. Our attack can recover the 128-bit secret key of Grain-128a with a computational complexity of 2^{96.322} , requiring 2^{96} chosen IVs and 2^{103.613} keystream bits. The success probability of our attack is 0.632. This related key attack is “minimal” in the sense that it only requires two related keys. The result shows that our attack is much better than an exhaustive key search in the related key setting.
  • Keywords
    Authentication; Ciphers; Computational complexity; Cryptography; Cryptanalysis; grain-128a; related key chosen IV attack; stream cipher;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2256419
  • Filename
    6507611