Skip to main content

Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4817))

Abstract

TSC-4 is a T-function based stream cipher with 80-bit key, and proposed as a candidate for ECRYPT eStream project. In this paper, we introduce a differential method to analyze TSC-4. Our attack is based on the vulnerable differential characteristics in the state initialization of TSC-4, and for the chosen IV pairs, the differential probability is up to 2− 15.40 in the case of weak keys. We show that there are about 272 weak keys among the total 280 keys. To recover 8 bits of a weak key needs about 240.53 chosen IV pairs. After that, we can search the other 72 key bits by an exhaustive attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hong, J., Lee, D.H., Yeom, Y., Han, D.: New Class of Single Cycle T-functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 68–82. Springer, Heidelberg (2005)

    Google Scholar 

  2. Hong, J., Lee, D.H., Yeom, Y., Han, D., Chee, S.: T-function Based Stream Cipher TSC-3, available at http://www.ecrypt.eu.org/stream/ciphers/tsc3/tsc3.pdf

  3. Fischer, S., Meier, W., Berbain, C., et al.: Non-randomness is eSTREAM Candidates Salsa20 and TSC-4. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 2–16. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Klimov, A., Shamir, A.: A New Class of Invertible Mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 470–483. Springer, Heidelberg (2003)

    Google Scholar 

  5. Klimov, A., Shamir, A.: Cryptographic Application of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 248–261. Springer, Heidelberg (2004)

    Google Scholar 

  6. Klimov, A., Shamir, A.: New Cryptographic Primitives Based on Multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 1–15. Springer, Heidelberg (2004)

    Google Scholar 

  7. Kunzli, S., Junod, P., Meier, W.: Distinguishing Attacks on T-functions. In: International Conference on Cryptology in Malaysia (2005)

    Google Scholar 

  8. Mitra, J., Sarkar, P.: Time-memory Trade-Off Attacks on Multiplications and T-functions. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 468–482. Springer, Heidelberg (2004)

    Google Scholar 

  9. Moon, D., Kwon, D., Han, D., et al.: T-function Based Stream Cipher TSC-4, available at http://www.ecrypt.eu.org/stream/p2ciphers/tsc4/tsc4_p2.pdf

  10. Muller, F., Peyrin, T.: Linear Cryptanalysis of the TSC Family of Stream Ciphers. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 373–394. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Muller, F., Peyrin, T.: Linear Cryptanalysis of TSC Stream Ciphers - Applications to the ECRYPT Proposal TSC-3, available at http://www.ecrypt.eu.org/stream/papersdir/042.ps

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kil-Hyun Nam Gwangsoo Rhee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, H., Wang, X. (2007). Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. In: Nam, KH., Rhee, G. (eds) Information Security and Cryptology - ICISC 2007. ICISC 2007. Lecture Notes in Computer Science, vol 4817. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76788-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-76788-6_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-76787-9

  • Online ISBN: 978-3-540-76788-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics