Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI

  • Takanori Isobe
  • Toshihiro Ohigashi
  • Masakatu Morii
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7631)


In this paper, we analyze a slide property of RAKAPOSHI stream cipher. To begin, we show that any Key-IV pair has a corresponding slide Key-IV pair that generates an n-bit shifted keystream with probability of 2− 2n . Then we exploit this property in order to develop a key recovery attack on RAKAPOSHI in the related key setting. Our attack is able to recover a 128-bit key with time complexity of 241 and 238 chosen IVs. The result reveals that RAKAPOSHI is vulnerable to the related key attack. After that, we consider a variant of the slide property, called partial slide property. It enables us to construct a method for speeding up the brute force attack by a factor of 2 in the single key setting. Finally, we consider a slide property of K2 v2.0 stream cipher, and discuss the possibility of an attack exploiting the slide property.


stream cipher slide attack related-key attack RAKAPOSHI K2 v2.0 initialization process 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ISO/IEC 18033-4. Amendment 1 - Information technology - security techniques - Encryption algorithms - Part 4: Stream ciphers, JTC 1/SC 27 (IT security tech.) (2011),
  2. 2.
    Arnault, F., Berger, T.P.: F-FCSR: Design of a New Class of Stream Ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 83–97. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A Lightweight Hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 1–15. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Babbage, S., Dodd, M.: The MICKEY Stream Ciphers. In: Robshaw and Billet [22], pp. 191–209Google Scholar
  5. 5.
    Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: SPONGENT: A Lightweight Hash Function. In: Preneel and Takagi [21], pp. 312–325Google Scholar
  6. 6.
    Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    De Cannière, C., Preneel, B.: Trivium. In: Robshaw and Billet [22], pp. 244–266Google Scholar
  8. 8.
    De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  9. 9.
    De Cannière, C., Küçük, Ö., Preneel, B.: Analysis of Grain’s Initialization Algorithm. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 276–289. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  10. 10.
    Cid, C., Kiyomoto, S., Kurihara, J.: The rakaposhi Stream Cipher. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 32–46. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Dinur, I., Güneysu, T., Paar, C., Shamir, A., Zimmermann, R.: An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 327–343. Springer, Heidelberg (2011)Google Scholar
  12. 12.
    The eSTREAM Project,
  13. 13.
    Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222–239. Springer, Heidelberg (2011)Google Scholar
  14. 14.
    Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.J.B.: The LED Block Cipher. In: Preneel and Takagi [21], pp. 326–341Google Scholar
  15. 15.
    Hell, M., Johansson, T.: Breaking the Stream Ciphers F-FCSR-H and F-FCSR-16 in Real Time. J. Cryptology 24(3), 427–445 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  16. 16.
    Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain Family of Stream Ciphers. In: Robshaw and Billet [22], pp. 179–190Google Scholar
  17. 17.
    Imai, H., Yamagishi, A.: CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn., pp. 285–288. Springer (2011)Google Scholar
  18. 18.
    Isobe, T., Ohigashi, T., Kuwakado, H., Morii, M.: A Chosen-IV Key Recovery Attack on Py and Pypy. IEICE Transactions 92-D(1), 32–40 (2009)Google Scholar
  19. 19.
    Kiyomoto, S., Tanaka, T., Sakurai, K.: K2: A Stream Cipher Algorithm using Dynamic Feedback Control. In: Hernando, J., Fernández-Medina, E., Malek, M. (eds.) SECRYPT, pp. 204–213. INSTICC Press (2007)Google Scholar
  20. 20.
    Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 321–335. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  21. 21.
    Preneel, B., Takagi, T. (eds.): CHES 2011. LNCS, vol. 6917. Springer, Heidelberg (2011)zbMATHGoogle Scholar
  22. 22.
    Robshaw, M.J.B., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)Google Scholar
  23. 23.
    Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An Ultra-Lightweight Blockcipher. In: Preneel and Takagi [21], pp. 342–357Google Scholar
  24. 24.
    Wu, H., Preneel, B.: Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 276–290. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Takanori Isobe
    • 1
    • 3
  • Toshihiro Ohigashi
    • 2
  • Masakatu Morii
    • 3
  1. 1.Sony CorporationMinato-kuJapan
  2. 2.Hiroshima UniversityHigashi-HiroshimaJapan
  3. 3.Kobe UniversityNada-kuJapan

Personalised recommendations