Some Results on Sprout

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9462)

Abstract

Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two state Registers of size 40 bits each, which is exactly half the state size of Grain v1. In spite of this, the cipher does not appear to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design. In this paper, we first present improved results on Key Recovery with partial knowledge of the internal state. We show that if 50 of the 80 bits of the internal state are guessed then the remaining bits along with the secret key can be found in a reasonable time using a SAT solver. Thereafter, we show that it is possible to perform a distinguishing attack on the full Sprout stream cipher in the multiple IV setting using around \(2^{40}\) randomly chosen IVs on an average. The attack requires around \(2^{48}\) bits of memory. Thereafter, we will show that for every secret key, there exist around \(2^{30}\) IVs for which the LFSR used in Sprout enters the all zero state during the keystream generating phase. Using this observation, we will first show that it is possible to enumerate Key-IV pairs that produce keystream bits with period as small as 80. We will then outline a simple key recovery attack that takes time equivalent to \(2^{66.7}\) encryptions with negligible memory requirement. This although is not the best attack reported against this cipher in terms of the time complexity, it is the best in terms of the memory required to perform the attack.

Keywords

Grain v1 Sprout Stream cipher 

References

  1. 1.
    The ECRYPT Stream Cipher Project. eSTREAM Portfolio of Stream Ciphers. Accessed on 8 September 2008Google Scholar
  2. 2.
    Armknecht, F., Mikhalev, V.: On lightweight stream ciphers with shorter internal states. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 451–470. Springer, Heidelberg (2015) CrossRefGoogle Scholar
  3. 3.
    Babbage, S., Dodd, M.: The stream cipher MICKEY 2.0. ECRYPT Stream Cipher Project Report. http://www.ecrypt.eu.org/stream/p3ciphers/mickey/mickey_p3.pdf
  4. 4.
    Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000) CrossRefGoogle Scholar
  5. 5.
    De Cannière, C., Preneel, B.: TRIVIUM -Specifications. ECRYPT Stream Cipher Project Report. http://www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf
  6. 6.
    Esgin, M.F., Kara, O.: Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. To appear in Selected Areas in Cryptography (2015)Google Scholar
  7. 7.
    Fredricksen, H.: A survey of full length nonlinear shift register cycle algorithms. SIAM Rev. 24(1982), 195–221 (1982)MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Golomb, S.W.: Shift Register Sequences. Holden-Day Inc., Laguna Hills (1967) MATHGoogle Scholar
  9. 9.
    Hao, Y.: A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. http://eprint.iacr.org/2015/231.pdf
  10. 10.
    Lallemand, V., Naya-Plasencia, M.: Cryptanalysis of full Sprout. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 663–682. Springer, Heidelberg (2015) CrossRefGoogle Scholar
  11. 11.
    Hell, M., Johansson, T., Meier, W.: Grain - A Stream Cipher for Constrained Environments. ECRYPT Stream Cipher Project Report 2005/001 (2005). http://www.ecrypt.eu.org/stream
  12. 12.
    Hell, M., Johansson, T., Meier, W.: A stream cipher proposal: Grain-128. In: IEEE International Symposium on Information Theory (ISIT 2006) (2006)Google Scholar
  13. 13.
    Maitra, S., Sarkar, S., Baksi, A., Dey, P.: Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. http://eprint.iacr.org/2015/236.pdf
  14. 14.
    Sarkar, S., Banik, S., Maitra, S.: Differential Fault Attack against Grain family with very few faults and minimal assumptions. http://eprint.iacr.org/2013/494.pdf
  15. 15.
    Soos, M.: CryptoMiniSat-2.9.5. http://www.msoos.org/cryptominisat2/
  16. 16.
    Stein, W.: Sage Mathematics Software. Free Software Foundation Inc. (2009). http://www.sagemath.org. (Open source project initiated by W. Stein and contributed by many)

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.DTU ComputeTechnical University of DenmarkKgs. LyngbyDenmark

Personalised recommendations