Abstract
In 2007, S. Kiyomoto, T. Tanaka and K. Sakurai presented the stream cipher K2 at SECRYPT. In this paper, we present two attacks on simplified versions of K2. We show a differential chosen IV attack with key recovery on a simplified version with 5 initialization clocks with time complexity of 28.1 clocks. For a simplified version with 7 initialization clocks, we show a distinguishing attack with time complexity of 234.8 clocks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bogdanov, A., Preneel, B., Rijmen, V.: Security Evaluation of the K2 Stream Cipher (March 2011), http://www.cryptrec.go.jp/estimation/techrep_id2010_2.pdf
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)
Henricksen, M., Yap, W.S., Yian, C.H., Kiyomoto, S., Tanaka, T.: Side-Channel Analysis of the K2 Stream Cipher. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 53–73. Springer, Heidelberg (2010)
Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A stream cipher algorithm using dynamic feedback control. In: Hernando, J., Fernández-Medina, E., Malek, M. (eds.) SECRYPT, pp. 204–213. INSTICC Press (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Priemuth-Schmid, D. (2012). Attacks on Simplified Versions of K2. In: Bouvry, P., Kłopotek, M.A., Leprévost, F., Marciniak, M., Mykowiecka, A., Rybiński, H. (eds) Security and Intelligent Information Systems. SIIS 2011. Lecture Notes in Computer Science, vol 7053. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25261-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-25261-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25260-0
Online ISBN: 978-3-642-25261-7
eBook Packages: Computer ScienceComputer Science (R0)