Abstract
TSC-4 is a T-function based stream cipher with 80-bit key, and proposed as a candidate for ECRYPT eStream project. In this paper, we introduce a differential method to analyze TSC-4. Our attack is based on the vulnerable differential characteristics in the state initialization of TSC-4, and for the chosen IV pairs, the differential probability is up to 2− 15.40 in the case of weak keys. We show that there are about 272 weak keys among the total 280 keys. To recover 8 bits of a weak key needs about 240.53 chosen IV pairs. After that, we can search the other 72 key bits by an exhaustive attack.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hong, J., Lee, D.H., Yeom, Y., Han, D.: New Class of Single Cycle T-functions. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 68–82. Springer, Heidelberg (2005)
Hong, J., Lee, D.H., Yeom, Y., Han, D., Chee, S.: T-function Based Stream Cipher TSC-3, available at http://www.ecrypt.eu.org/stream/ciphers/tsc3/tsc3.pdf
Fischer, S., Meier, W., Berbain, C., et al.: Non-randomness is eSTREAM Candidates Salsa20 and TSC-4. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 2–16. Springer, Heidelberg (2006)
Klimov, A., Shamir, A.: A New Class of Invertible Mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 470–483. Springer, Heidelberg (2003)
Klimov, A., Shamir, A.: Cryptographic Application of T-functions. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 248–261. Springer, Heidelberg (2004)
Klimov, A., Shamir, A.: New Cryptographic Primitives Based on Multiword T-functions. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 1–15. Springer, Heidelberg (2004)
Kunzli, S., Junod, P., Meier, W.: Distinguishing Attacks on T-functions. In: International Conference on Cryptology in Malaysia (2005)
Mitra, J., Sarkar, P.: Time-memory Trade-Off Attacks on Multiplications and T-functions. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 468–482. Springer, Heidelberg (2004)
Moon, D., Kwon, D., Han, D., et al.: T-function Based Stream Cipher TSC-4, available at http://www.ecrypt.eu.org/stream/p2ciphers/tsc4/tsc4_p2.pdf
Muller, F., Peyrin, T.: Linear Cryptanalysis of the TSC Family of Stream Ciphers. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 373–394. Springer, Heidelberg (2005)
Muller, F., Peyrin, T.: Linear Cryptanalysis of TSC Stream Ciphers - Applications to the ECRYPT Proposal TSC-3, available at http://www.ecrypt.eu.org/stream/papersdir/042.ps
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, H., Wang, X. (2007). Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. In: Nam, KH., Rhee, G. (eds) Information Security and Cryptology - ICISC 2007. ICISC 2007. Lecture Notes in Computer Science, vol 4817. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76788-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-76788-6_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76787-9
Online ISBN: 978-3-540-76788-6
eBook Packages: Computer ScienceComputer Science (R0)