TweLEX: A Tweaked Version of the LEX Stream Cipher
نویسندگان
چکیده
LEX is a stream cipher proposed by Alex Biryukov. It was selected to phase 3 of the eSTREAM competition. LEX is based on the Advanced Encryption Standard (AES) block cipher and uses a methodology called Leak Extraction, proposed by Biryukov himself. However Dunkelman and Keller show that a key recovery attack exists against LEX. Their attack requires 2 bytes of keystream produced by the same key and works with a time complexity of 2 operations. In this work we explore LEX further and have shown that under the assumption of a related key model we can obtain 24 secret state bytes with a time complexity of 2 and a data complexity of 2. Subsequently, we introduce a tweaked version of LEX, called TweLEX, which is shown to resist all known attacks against LEX. Though the throughput of TweLEX is half of LEX, it is still 1.25 times faster than AES, the underlying block cipher. This work attempts to revive the principle of leak extraction as a simple and elegant method to design stream ciphers.
منابع مشابه
A New Attack on the LEX Stream Cipher
In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we s...
متن کاملAlgebraic cryptanalysis of a small-scale version of stream cipher Lex
In this paper we analyse with respect to algebraic attacks a small-scale version of the stream cipher Lex. We base it on a small-scale version of the block cipher AES with 16-bit state and 16-bit key. We represent the small-scale Lex and its key schedule in two alternative ways: as a system of cubic boolean equations and as a system of quadratic boolean equations. We use Gröbner bases to solve ...
متن کاملCryptanalysis of the Stream Cipher LEX
In [6], Biryukov presented a new methodology of stream cipher design called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity, and performance, was expected to be selected to the eSTREAM portfolio. In this paper we ...
متن کاملOn IV Setup of Pomaranch
Pomaranch is a synchronous bit-oriented stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. Following the recently published chosen IV [1] and correlation [7] key-recovery attacks, the authors changed the configuration of jump registers and introduced two new key-IV setup procedures for the cipher. We call the updated version as Tweaked Pomaranch vs. Original Pomaranch [4]. In...
متن کاملCryptanalysis of Ciphers Based on AES Structure
AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). Our present work investigates the recently reported attacks on AES 256 and AES 192. Instead of concentrating on the actual algorithms of these attacks we shall be more...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011