Abstract
RAKAPOSHI is a hardware oriented stream cipher designed by Cid et al. in 2009. It is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some mistakes existing in the related key attack on RAKAPOSHI by Isobe et al., and propose a new related key attack on RAKAPOSHI, which recovers the 128-bit secret key with a time complexity of 256, requiring one related key and 255 chosen IVs. Furthermore, an improved key recovery attack on RAKAPOSHI in the multiple related key setting is proposed with a time complexity of 233, requiring 212.58 chosen IVs. As confirmed by the experimental results, our new attack can recover all 128 key bits of RAKAPOSHI in less than 1.5 hours on a PC.
This work is supported in part by the National Natural Science Foundation of China (Grant No. 61202491, 61272041, 61272488, 61402523), the Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-13-007), and the Science and Technology on Communication Security Laboratory Foundation of China under Grant No. 9140C110203140C11049.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
New European Schemes for Signatures, Integrity, and Encryption, http://www.cryptonessie.org (accessed August 18, 2003)
ECRYPT. eSTREAM: ECRYPT Stream Cipher Project, IST-2002-507932, http://www.ecrypt.eu.org/stream/ (accessed September 29, 2005)
Cid, C., Kiyomoto, S., Kurihara, J.: The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 32–46. Springer, Heidelberg (2009)
Beth, T., Piper, F.: The Stop-and-Go Generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 88–92. Springer, Heidelberg (1985)
Simpson, L.R., Dawson, E., Golić, J.D., Millan, W.L.: LILI Keystream Generator. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 248–261. Springer, Heidelberg (2001)
Horan, D., Guinee, R.: A Novel Keystream Generator using Pseudo Random Binary Sequences for Cryptographic Applications. In: Proceedings of Irish Signals and Systems Conference, pp. 451–456. IEEE (2006)
Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm Using Dynamic Feedback Control. In: Proceedings of SECRYPT 2007, pp. 204–213 (2007)
Isobe, T., Ohigashi, T., Morii, M.: Slide cryptanalysis of lightweight stream cipher RAKAPOSHI. In: Hanaoka, G., Yamauchi, T. (eds.) IWSEC 2012. LNCS, vol. 7631, pp. 138–155. Springer, Heidelberg (2012)
Orumiehchiha, M.A., Pieprzyk, J., Shakour, E., Steinfeld, R.: Security Evaluation of Rakaposhi Stream Cipher. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 361–371. Springer, Heidelberg (2013)
Ding, L., Guan, J.: Cryptanalysis of RAKAPOSHI Stream Cipher, Cryptology ePrint Archive Report 2012/696, http://eprint.iacr.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ding, L., Jin, C., Guan, J., Zhang, S., Cui, T., Zhao, W. (2015). New Related Key Attacks on the RAKAPOSHI Stream Cipher. In: Lopez, J., Wu, Y. (eds) Information Security Practice and Experience. ISPEC 2015. Lecture Notes in Computer Science(), vol 9065. Springer, Cham. https://doi.org/10.1007/978-3-319-17533-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-17533-1_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17532-4
Online ISBN: 978-3-319-17533-1
eBook Packages: Computer ScienceComputer Science (R0)