Cryptology ePrint Archive: Report 2009/109
Cryptanalysis of Stream Cipher Grain Family
Haina Zhang and Xiaoyun Wang
Abstract: Grain v1 is one of the 7 final candidates of ECRYPT
eStream project, which involves in the 80-bit secret key. Grain-128
is a variant version with 128-bit secret key, and Grain v0 is the
original version in the first evaluation phase. Firstly, we describe
a distinguishing attack against the Grain family with weak Key-IVs.
Utilizing the second Walsh spectra of the nonlinear functions, we
show that there are $2^{64}$/$2^{64}$/$2^{96}$ weak Key-IVs among
total $2^{144}$/$2^{144}$/$2^{224}$ Key-IVs, and to distinguish a
weak Key-IV needs about $2^{12.6}$/$2^{44.2}$/$2^{86}$ keystream
bits and $2^{15.8}$/$2^{47.5}$/ $2^{104.2}$ operations for Grain
v0, Grain v1 and Grain-128 respectively. Secondly, we apply
algebraic attacks to the Grain family with a weak Key-IV, and can
recover the secret key in about 2 seconds and 150 keystream bits for
Grain v0 and Grain v1, and reveal the key of Grain-128 with about
100 keystream bits and $2^{93.8}$ operations. Furthermore, we
discuss the period of the keystream with a weak Key-IV for any
Grain-like structure which can lead in self-sliding attack.
Category / Keywords: stream cipher, cryptanalysis, Grain
Date: received 7 Mar 2009, last revised 7 Mar 2009
Contact author: hnzhang cn at gmail com, foxseazhn@sina com
Available formats: PDF | BibTeX Citation
Note: The text submitted is not the last.
Version: 20090311:015211 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]