Abstract
In this paper we introduce a general framework of related-key attack on block-wise stream ciphers which are suitable for the protection of multimedia and ubiquitous systems. As a case study, we show how our cryptanalytic framework is applied to a block-wise stream cipher TWOPRIME: we construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of 214 known plaintext blocks and a time complexity of 232 8-bit table lookups. We expect that our general framework for a related-key attack would be useful tool for analyzing many of block-wise stream ciphers.
Similar content being viewed by others
References
Advanced encryption algorithm (AES) development effort, 1997–2000. http://csrc.nist.gov/encryption/aes/.
Bellare, M., & Kohno, T. (2003). A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In LNCS : Vol. 2654. Advances in cryptology—EUROCRYPT’03 (pp. 491–506). Berlin: Springer.
Biham, E. (1994). New types of cryptanalytic attack using related keys. In LNCS : Vol. 765. Advances in cryptology—EUROCRYPT’93 (pp. 398–409). Berlin: Springer. Journal of Cryptology, 7(4), 156–171 (1994).
Biham, E., Dunkelman, O., & Keller, N. (2005). Related-key boomerang and rectangle attacks. In LNCS : Vol. 3494. Advances in cryptology—proceedings of EUROCRYPT 2005 (pp. 507–525). Berlin: Springer.
Biham, E., Dunkelman, O., & Keller, N. (2005). A related-key rectangle attack on the full KASUMI. In LNCS : Vol. 3788. Advances in cryptology—proceedings of ASIACRYPT 2005 (pp. 443–461). Berlin: Springer.
Biham, E., Dunkelman, O., & Keller, N. (2006). Related-key impossible differential attacks on AES-192. In LNCS : Vol. 3860. Topics in cryptology—proceedings of CT-RSA 2006 (pp. 21–31). Berlin: Springer.
Blunden, M., & Escott, A. (2001). Related key attacks on reduced round KASUMI. In LNCS : Vol. 2355. The 8th fast software encryption workshop (FSE’01) (pp. 277–285). Berlin: Springer.
Coppersmith, D., Wagner, D., Schneier, B., & Kelsey, J. (1998). Cryptanalysis of TWOPRIME. In LNCS : Vol. 1372. The 5th fast software encryption workshop (FSE’98) (pp. 32–48). Berlin: Springer.
Daemen, J., & Clapp, C. (1998). Fast hashing and stream encryption with PANAMA. In LNCS : Vol. 1372. The 5th fast software encryption workshop (FSE’98) (pp. 60–74). Berlin: Springer.
Ding, C., Niemi, V., Renvall, A., & Salomaa, A. (1997). TWOPRIME: A fast stream ciphering algorithm. In LNCS : Vol. 1267. The 4th fast software encryption workshop (FSE’97) (pp. 88–102). Berlin: Springer.
Dunkelman, O., Keller, N., & Kim, J. (2006). Related-key rectangle attack on the full SHACAL-1. In LNCS : Vol. 4356. SAC’06 (pp. 28–44). Berlin: Springer.
Ekdahl, P., & Johansson, T. (2002). A new version of the stream cipher SNOW. In LNCS : Vol. 2595. SAC’02 (pp. 47–61). Berlin: Springer.
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., & Kohno, T. (2003). Helix: Fast encryption and authentication in a single cryptographic primitive. In LNCS : Vol. 2887. The 10th fast software encryption workshop (FSE’03) (pp. 330–346). Berlin: Springer.
Gorski, M., & Lucks, S. (2008). New related-key boomerang attacks on AES. In LNCS : Vol. 5365. INDOCRYPT’08 (pp. 266–278). Berlin: Springer.
Grosul, A., & Wallach, D. (2000). A related-key cryptanalysis of RC4 (Technical Report TR-00-358). Rice University, June 2000.
Halevi, S., Coppersmith, D., & Jutla, C. (2002). Scream: A software-efficient stream cipher. In LNCS : Vol. 2365. The 9th fast software encryption workshop (FSE’02) (pp. 195–209). Berlin: Springer.
Hawkes, P., & Rose, G. G. (2000). Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE. In Proceedings of the first open NESSIE workshop.
Hong, S., Kim, J., Lee, S., & Preneel, B. (2005). Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. In LNCS : Vol. 3557. The 12th fast software encryption workshop (FSE’05) (pp. 368–383). Berlin: Springer.
Jakimoski, G., & Desmedt, Y. (2004). Related-key differential cryptanalysis of 192-bit key AES variants. In LNCS : Vol. 3006. SAC’03 (pp. 208–221). Berlin: Springer.
Jeong, K., Lee, C., Sung, J., Hong, S., & Lim, J. (2007). Related-key amplified boomerang attacks on the full-round Eagle-64 and Eagle-128. In LNCS : Vol. 4586. ACISP’07 (pp. 143–157). Berlin: Springer.
Kelsey, J., Schneier, B., & Wagner, D. (1996). Key schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. In LNCS : Vol. 1109. Advances in cryptology—CRYPTO’96 (pp. 237–251). Berlin: Springer.
Kelsey, J., Schneir, B., & Wagner, D. (1997). Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In LNCS : Vol. 1334. ICICS’97 (pp. 233–246). Berlin: Springer.
Kim, J., Kim, G., Hong, S., Lee, S., & Hong, D. (2004). The related-key rectangle attack—application to SHACAL-1. In LNCS : Vol. 3108. ACISP’04 (pp. 123–136). Berlin: Springer.
Kim, J., Kim, G., Lee, S., Lim, J., & Song, J. (2004). Related-key attacks on reduced rounds of SHACAL-2. In LNCS : Vol. 3348. Proceedings of INDOCRYPT 2004 (pp. 175–189). Berlin: Springer.
Kim, J., Hong, S., & Preneel, B. (2007). Related-key rectangle attacks on reduced AES-192 and AES-256. In LNCS : Vol. 4593. The 14th fast software encryption workshop (FSE’07 (pp. 225–241). Berlin: Springer.
Knudsen, L. R. (1993). Cryptanalysis of LOKI91. In LNCS : Vol. 718. Advances in cryptology—AUSCRYPT’92 (pp. 196–208). Berlin: Springer.
Ko, Y., Hong, S., Lee, W., Lee, S., & Kang, J. (2004). Related-key differential attacks on 26 rounds of XTEA and full rounds of GOST. In LNCS : Vol. 3017. The 11th fast software encryption workshop (FSE’04) (pp. 299–316). Berlin: Springer.
Lee, E., Kim, J., Hong, D., Lee, C., Sung, J., Hong, S., & Lim, J. (2008). Weak-key classes of 7-round MISTY 1 and 2 for related-key amplified boomerang attacks. IEICE Transactions, 91-A(2), 642–649.
Lee, C., Kim, J., Hong, S., Sung, J., & Lee, S. (2008). Security analysis of the full-round DDO-64 block cipher. Journal of Systems and Software, 81(1), 2328–2335.
Lu, J. (2008). Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security, 8(1), 1–11.
Lu, J., & Kim, J. (2008). Attacking 44 rounds of the SHACAL-2 block cipher using related-key rectangle cryptanalysis. IEICE Transactions, 91-A(9), 2588–2596.
Lu, J., Kim, J., Keller, N., & Dunkelman, O. (2006). Related-key rectangle attack on 42-round SHACAL-2. In LNCS : Vol. 4176. ISC’06 (pp. 85–100). Berlin: Springer.
Lu, J., Lee, C., & Kim, J. (2006). Related-key attacks on the full-round Cobra-F64a and Cobra-F64b. In LNCS : Vol. 4116. SCN’06 (pp. 95–110). Berlin: Springer.
Lucks, S. (2004). Cipher secure against related-key attacks. In LNCS : Vol. 3017. The 11th fast software encryption workshop (FSE’04) (pp. 359–370). Berlin: Springer.
Lucks, S., & Weis, R. (1999). A Related-key attack against 14 rounds of skipjack (Technical Report). Universitat Mannheim.
Phan, R. C.-W., & Handschuh, H. (2004). On related-key and collision attacks: the case for the IBM 4758 cryptoprocessor. In LNCS : Vol. 3225. ISC 2004 (pp. 111–122). Berlin: Springer.
Phan, R. C.-W., & Shamir, A. (2008). Improved related-key attacks on DESX and DESX+. Cryptologia, 32(1), 13–22.
Razali, E., & Phan, R. C.-W. (2006). On the existence of related-key oracles in cryptosystems based on block ciphers. In LNCS : Vol. 4277. OTM Workshops 2006 (pp. 425–438). Berlin: Springer.
Rivest, R. (1996). RC4, unpublished work (a description of RC4 appears in B. Schneier, Applied Cryptography, 1996).
Rogaway, P., & Coppersmith, D. (1994). A software-optimized encryption algorithm. In LNCS : Vol. 809. The 1st fast software encryption workshop (FSE’93) (pp. 56–63). Berlin: Springer.
Sekar, G., Paul, S., & Preneel, B. (2007). Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses. In LNCS : Vol. 4859. Indocrypt’07 (pp. 58–72). Berlin: Springer.
Shannon, C. E. (1948). A mathematical theory of communication. Bell Systems Technical Journal.
Wang, G. (2007). Related-key rectangle attack on 43-round SHACAL-2. In LNCS : Vol. 4464. ISPEC’07 (pp. 33–42). Berlin: Springer.
Zhang, W., Wu, W., Zhang, L., & Feng, D. (2007). Improved related-key impossible differential attacks on reduced-round AES-192. In LNCS : Vol. 4356. SAC’06 (pp. 15–27). Berlin: Springer.
Zhang, W., Zhang, L., Wu, W., & Feng, D. (2007). Related-key differential-linear attacks on reduced AES-192. In LNCS : Vol. 4859. INDOCRYPT’07 (pp. 73–85). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, D.G., Kim, J., Sung, J. et al. Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommun Syst 44, 297–306 (2010). https://doi.org/10.1007/s11235-009-9255-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-009-9255-9