Cryptanalysis of Pomaranch (CJCSG)

نویسنده

  • Shahram Khazaei
چکیده

Pomaranch is a synchronous stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. It uses 128-bit keys and IVs with different lengths. The cipher is constructed as a cascade clock control sequence generator, which is based on the notion of jump registers. Each jump register can be considered as a non-autonomous finite state machine which the input sequence is called jump control sequence. In this paper we show that a jump register with a balanced identically distributed binary jump control sequence can be modeled as a non-autonomous linear finite state machine with an additive unbalanced input sequence. Using this result we mount a correlation based key-recovery attack on Pomaranch with computational complexity around 2 using about 2 bits of the output sequence.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Pomaranch

Pomaranch [3] is a synchronous stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is constructed as a cascade clock control sequence generator, which is based on the notion of jump registers. In this paper we present an attack which exploits the cipher's initialization procedure to recover the 128-bit secret key. The attack requires around 2 computations. An improv...

متن کامل

On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2

We give a simple algorithm that can find biased linear approximations of nonlinear building blocks. The algorithm is useful if the building block is relatively small and exhaustive search is possible. Instead of searching all possible linear relations individually, we show how the most biased relation can be found in just a few steps. As an example we show how we can find a biased relation in t...

متن کامل

Pomaranch - Design and Analysis of a Family of Stream Ciphers ∗

Pomaranch is a synchronous, hardware-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher is designed as a cascade clock-controlled key-stream generator built on jump registers. This paper presents a discussion over the attacks on Pomaranch discovered so far. Particular focus is made on a new inherent property of jump registers that allows to construct their...

متن کامل

Pomaranch is Sound and Healthy

Recently two attacks on the Pomaranch stream cipher have been described pointing to two weaknesses in the original design, namely the IV initialization procedure, and the characteristic polynomial used in the jump registers. The latter weakness has already been repaired as described in a previous note by the authors [1]. In this note we provide a simple tweak which effectively counters the atta...

متن کامل

Countering the Correlation Attack on Pomaranch

A recent key-recovery attack on Pomaranch stream cipher was built due to the spotted biases in the distribution of certain linear relations in the output sequence of a Jump Register Section. All the relations and corresponding biases were found by computer experiments. The suggested attack has the complexity O(2) and requires 2 bits of the key-stream. In this paper we give theoretical reasons e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005