Abstract
Trivium is a keystream generator for a binary additive synchronous stream cipher. It was selected in the final portfolio for the Profile 2 category of the eSTREAM project. The keystream generator is constructed using bit-based shift registers. In this paper we present an alternate representation of Trivium using word-based shift registers, with a word size of three bits. This representation is useful for determining cycles of internal state values. Under this representation it is clear that the state space can be partitioned into subspaces and that over some of these subspaces the state update function is effectively linear. The role of the initialization process is critical in ensuring the states used for generating keystream are updated nonlinearly at some point, as the state update function alone does not provide this.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12095-012-0066-6/MediaObjects/12095_2012_66_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12095-012-0066-6/MediaObjects/12095_2012_66_Fig2_HTML.gif)
Similar content being viewed by others
References
Bernstein, D.: A reformulation of TRIVIUM. Submission to Phorum: ECRYPT forum, 20 February 2006. Available at http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (eds.) Advances in Cryptology—CRYPTO’03. Lecture Notes in Computer Science, vol. 2729, pp. 177–194. Springer, Berlin (2003)
de Canniere, C., Preneel, B.: Trivium specification. Submission to eSTREAM, ECRYPT Stream Cipher Project. Report 2005/030 (2005). Available at http://www.ecrypt.eu.org/stream/ciphers/trivium/trivium.pdf
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) Advances in Cryptology—EUROCRYPT 2009. Lecture Notes in Computer Science, vol. 5479, pp. 278–299. Springer, Berlin (2009)
Englund, H., Johansson, T., Turan, M.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) Progress in Cryptology—INDOCRYPT 2007. Lecture Notes in Computer Science, vol. 4859, pp. 268–281. Springer, Berlin (2007)
eSTREAM: The ECRYPT Stream Cipher Project. Available at http://www.ecrypt.eu.org/stream/
Hong, J.: Some trivial states of Trivium. Posted to eSTREAM Phorum, 7 September 2005
Hong, J.: Certain pairs of key–IV pairs for Trivium. Posted to eSTREAM Phorum, 13 September 2005
Hu, H., Gong, G.: Periods on two kinds of nonlinear feedback shift registers with time varying feedback functions. Int. J. Found. Comput. Sci. 22(6), 1317–1329 (2011)
Khazaei, S.: Re: A reformulation of TRIVIUM. Submission to Phorum: ECRYPT forum, 21 February 2006. Available at http://www.ecrypt.eu.org/stream/phorum/read.php?1,448
Khazaei, S., Hasanzadeh, M.: Linear sequential circuit approximation of the trivium stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/063 (2005). Available at http://www.ecrypt.eu.org/stream/papersdir/2005/063.pdf
Maximov, A., Biryukov, A.: Two trivial attacks on trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/003 (2007). Available at http://www.ecrypt.eu.org/stream/papersdir/2007/003.pdf
Raddum, H.: Cryptanalytic results on trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039 (2006). Available at http://www.ecrypt.eu.org/stream/papersdir/2006/039.pdf
Turan, M., Kara, O.: Linear approximations for 2-round trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/008 (2007). Available at http://www.ecrypt.eu.org/stream/papersdir/2007/008.pdf
Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. IACR Cryptology eprint Archive, Report 2007/413 (2007). Available at http://eprint.iacr.org/2007/413.pdf
Vielhaber, M.: AIDA breaks BIVIUM (A & B) in 1 minute dual core CPU time. IACR Cryptology eprint Archive, Report 2009/402 (2009). Available at http://eprint.iacr.org/2009/402.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Simpson, L., Boztas, S. State cycles, initialization and the Trivium stream cipher. Cryptogr. Commun. 4, 245–258 (2012). https://doi.org/10.1007/s12095-012-0066-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-012-0066-6