Advertisement

Loosening the KNOT

  • Antoine Joux
  • Frédéric Muller
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)

Abstract

In this paper, we present differential attacks on the self-synchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 262 and requires 240 chosen ciphertext bits.

Keywords

State Machine Internal State Memory Cell Exhaustive Search Block Cipher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)Google Scholar
  2. 2.
    Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)Google Scholar
  3. 3.
    Daemen, J.: Cipher and hash function design. Strategies based on linear and differential cryptanalysis. PhD thesis, Ch. 9 (March 1995)Google Scholar
  4. 4.
    Daemen, J., Govaerts, R., Vandewalle, J.: A practical approach to the design of high speed self-synchronizing stream ciphers. In: Singapore ICCS/ISITA 1992, pp. 279–283. IEEE, Los Alamitos (1992)Google Scholar
  5. 5.
    Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of rc4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Kaliski, B., Yin, Y.L.: On differential and linear cryptanalysis of the rc5 encryption algorithm. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 171–184. Springer, Heidelberg (1995)Google Scholar
  7. 7.
    Knudsen, L., Meier, W.: Improved differential attacks on rc5. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 216–228. Springer, Heidelberg (1996)Google Scholar
  8. 8.
    Maurer, U.M.: New approaches to the design of self-synchronizing stream ciphers. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 458–471. Springer, Heidelberg (1991)Google Scholar
  9. 9.
    National Bureau of Standard U.S. DES modes of operation (1980)Google Scholar
  10. 10.
    Preneel, B., Nuttin, M., Rijmen, R., Buelens, J.: Cryptanalysis of the cfb mode of the des with a reduced number of rounds. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 212–223. Springer, Heidelberg (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Antoine Joux
    • 1
  • Frédéric Muller
    • 1
  1. 1.DCSSI Crypto LabIssy-les-Moulineaux CedexFrance

Personalised recommendations