Paper 2013/268
Dynamic Cube Attack on Grain-v1
Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, and Mohammad Reza Aref
Abstract
This article aims to present dynamic cube attack on Grain-v1. Dynamic cube attack finds the secret key by using distinguishers gained from structural weakness. The main idea of dynamic cube attack lies in simplifying the output function. After making it simpler, dynamic cube attack will be able to exploit distinguishing attack for recovering the secret key. In this paper, we investigate Grain-v1 to which key recovery attack has never been applied because its feedback function is so sophisticated. we apply dynamic cube attack on it by utilizing both intelligent choices of Initial Value variables and appropriate simplifications. Our attack is done in feasible time complexity, and it recovers all bits of the key while the number of initialization rounds in Grain-v1 is decreased to 100. This attack is faster than exhaustive search by a factor $2^{32}$.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- stream cipherGrain-v1dynamic cube attackkey recovery attack
- Contact author(s)
- md rahimy @ gmail com
- History
- 2013-05-25: revised
- 2013-05-13: received
- See all versions
- Short URL
- https://ia.cr/2013/268
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/268, author = {Majid Rahimi and Mostafa Barmshory and Mohammad Hadi Mansouri and Mohammad Reza Aref}, title = {Dynamic Cube Attack on Grain-v1}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/268}, year = {2013}, url = {https://eprint.iacr.org/2013/268} }