You are looking at a specific version 20031029:123127 of this paper. See the latest version.

Paper 2003/162

Cryptanalysis of the Alleged SecurID Hash Function

Alex Biryukov and Joseph Lano and Bart Preneel

Abstract

The SecurID hash function is used for authenticating users to a corporate computer infrastructure. We analyse an alleged implementation of this hash function. The block cipher at the heart of the function can be broken in few milliseconds on a PC with 70 adaptively chosen plaintexts. The 64-bit secret key of 10$\%$ of the cards can be discovered given two months of token outputs and $2^{48}$ analysis steps. A larger fraction of cards can be covered given more observation time.

Note: New attack on the full Alleged SecurID Hash Function.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Updated version of a paper, which will appear in SAC'03 preproceedings
Keywords
alleged SecurIDcryptanalysisinternal collisionvanishing differential
Contact author(s)
abiryuko @ esat kuleuven ac be
History
2003-10-29: last of 3 revisions
2003-08-11: received
See all versions
Short URL
https://ia.cr/2003/162
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.