Cryptanalysis of Achterbahn

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4047)


We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the reduced and the full version with complexity of 255 and 261 steps.

Extensions of our attacks are also described to break modified versions of the Achterbahn stream cipher, which were proposed following the publication of preliminary cryptanalysis results.

These attacks highlight some problems in the design principle of Achterbahn, i.e., combining the outputs of several nonlinear (but small) shift registers using a nonlinear (but rather sparse) output function.


Output Function Linear Complexity Parity Check Stream Cipher Output Sequence 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bluetooth. Bluetooth Specification (November 2003),
  2. 2.
    Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    eSTREAM - The ECRYPT Stream Cipher Project,
  4. 4.
    Gammel, B., Göttfert, R., Kniffler, O.: Improved Boolean Combining Functions for Achterbahn. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/072 (2005),
  5. 5.
    Gammel, B., Göttfert, R., Kniffler, O.: The Achterbahn Stream Cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/002 (2005),
  6. 6.
    Johansson, T., Meier, W., Muller, F.: Cryptanalysis of Achterbahn. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/064 (2005),
  7. 7.
    Massey, J.: Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory 15, 122–127 (1969)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Meier, W., Staffelbach, O.: Fast Correlations Attacks on Certain Stream Ciphers. Journal of Cryptology, 159–176 (1989)Google Scholar
  9. 9.
    Siegenthaler, T.: Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Transactions on Information Theory 30, 776–780 (1984)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  1. 1.Department of Information TechnologyLund UniversityLundSweden
  2. 2.FH AargauWindischSwitzerland
  3. 3.HSBCFrance

Personalised recommendations