Abstract
In this paper, we present differential attacks on the self-synchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 262 and requires 240 chosen ciphertext bits.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)
Daemen, J.: Cipher and hash function design. Strategies based on linear and differential cryptanalysis. PhD thesis, Ch. 9 (March 1995)
Daemen, J., Govaerts, R., Vandewalle, J.: A practical approach to the design of high speed self-synchronizing stream ciphers. In: Singapore ICCS/ISITA 1992, pp. 279–283. IEEE, Los Alamitos (1992)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of rc4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Kaliski, B., Yin, Y.L.: On differential and linear cryptanalysis of the rc5 encryption algorithm. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 171–184. Springer, Heidelberg (1995)
Knudsen, L., Meier, W.: Improved differential attacks on rc5. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 216–228. Springer, Heidelberg (1996)
Maurer, U.M.: New approaches to the design of self-synchronizing stream ciphers. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 458–471. Springer, Heidelberg (1991)
National Bureau of Standard U.S. DES modes of operation (1980)
Preneel, B., Nuttin, M., Rijmen, R., Buelens, J.: Cryptanalysis of the cfb mode of the des with a reduced number of rounds. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 212–223. Springer, Heidelberg (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joux, A., Muller, F. (2003). Loosening the KNOT. In: Johansson, T. (eds) Fast Software Encryption. FSE 2003. Lecture Notes in Computer Science, vol 2887. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39887-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-39887-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20449-7
Online ISBN: 978-3-540-39887-5
eBook Packages: Springer Book Archive