Advertisement

A Time-Memory Tradeoff Attack Against LILI-128

  • Markku-Juhani Olavi Saarinen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2365)

Abstract

In this note we discuss a novel and simple time-memory tradeoff attack against the stream cipher LILI-128. The attack defeats the security advantage of having an irregular stepping function. The attack requires 246 bits of keystream, a lookup table of 245 89-bit words and computational effort which is roughly equivalent to 248 DES operations.

References

  1. 1.
    S. Babbage. Cryptanalysis of LILI-128. NESSIE Public Report, https://www.cosic.esat.kuleuven.ac.be/nessie/reports, 2001.
  2. 2.
    S. Babbage. A Space/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers, European Convention on Security and Detection, IEE Conference Publication No. 408, 1995.Google Scholar
  3. 3.
    A. Biryukov and A. Shamir, Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Proceedings of ASIACRYPT 2000, LNCS 1976, pp. 1–13, Springer-Verlag, 2000.CrossRefGoogle Scholar
  4. 4.
    A. Biryukov, A. Shamir, and D. Wagner, Real Time Cryptanalysis of A5/1 on a PC, Proceedings of FSE’ 2000, LNCS 1978, pp. 1–18, Springer-Verlag, 2001.Google Scholar
  5. 5.
    E. Dawson, J. Golić, W. Millan and L. Simpson, The LILI-128 Keystream Generator, Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology—SAC 2000, LNCS 2012, Springer-Verlag, 2000.Google Scholar
  6. 6.
    E. Dawson, J. Golić, W. Millan and L. Simpson, Response to Initial Report on LILI-128, Submitted to Second NESSIE Workshop, 2001.Google Scholar
  7. 7.
    M. E. Hellmab, A Cryptanalytic Time-Memory Trade-Off, IEEE Transactions on Information Theory, Vol. IT-26, N 4, pp. 401–406, 1980.CrossRefGoogle Scholar
  8. 8.
    F. Jönsson and T. Johansson, A Fast Correlation Attack on LILI-128., Information Processing Letters Vol 81, N. 3, Pages 127–132, 2001.CrossRefGoogle Scholar
  9. 9.
    J. White, Initial Report on the LILI-128 Stream Cipher, NESSIE Public Report, https://www.cosic.esat.kuleuven.ac.be/nessie/reports, 2001.

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Markku-Juhani Olavi Saarinen
    • 1
  1. 1.Laboratory for Theoretical Computer ScienceHelsinki University of TechnologyHUTFinland

Personalised recommendations