On IV Setup of Pomaranch
نویسندگان
چکیده
Pomaranch is a synchronous bit-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. Following the recently published chosen IV [1] and correlation [7] key-recovery attacks, the authors changed the configuration of jump registers and introduced two new key-IV setup procedures for the cipher. We call the updated version as Tweaked Pomaranch vs. Original Pomaranch [4]. In this paper we use the findings of [7] to mount a chosen IV key-recovery attack on the Original Pomaranch with computational complexity of O(2). The attack is also applicable to the first key-IV setup proposal for Tweaked Pomaranch with computational complexity of O(2). The alternative key-IV setup for Tweaked Pomaranch is immune against our attack. Both versions of Pomaranch deal with 128 bit keys.
منابع مشابه
Pomaranch is Sound and Healthy
Recently two attacks on the Pomaranch stream cipher have been described pointing to two weaknesses in the original design, namely the IV initialization procedure, and the characteristic polynomial used in the jump registers. The latter weakness has already been repaired as described in a previous note by the authors [1]. In this note we provide a simple tweak which effectively counters the atta...
متن کاملTwo General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with complexity less than exhaustive keysearch. The first attack is a distinguisher which needs keystream from only one or a few IVs to succeed. The attack is not only successful on Pomaranch Version 3 but has also less compu...
متن کاملPomaranch - Design and Analysis of a Family of Stream Ciphers ∗
Pomaranch is a synchronous, hardware-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is designed as a cascade clock-controlled key-stream generator built on jump registers. This paper presents a discussion over the attacks on Pomaranch discovered so far. Particular focus is made on a new inherent property of jump registers that allows to construct their...
متن کاملCountering the Correlation Attack on Pomaranch
A recent key-recovery attack on Pomaranch stream cipher was built due to the spotted biases in the distribution of certain linear relations in the output sequence of a Jump Register Section. All the relations and corresponding biases were found by computer experiments. The suggested attack has the complexity O(2) and requires 2 bits of the key-stream. In this paper we give theoretical reasons e...
متن کاملCascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher
Jump registers were recently proposed [SASC04] as building blocks for stream ciphers. In this paper a construction based on these principles is described. The proposed encryption primitive is a synchronous stream cipher accommodating a key of 128 bits and an IV of 64 up to 162 bits, or an 80-bit key and 32 to 108 bit IV. Version 3 comes as a final submission for the second phase of the eSTREAM ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005