In this paper we propose a dynamic cube attack on $105$ round Grain v1, that has a success probability of $100$\%, and thus we report an improvement of $8$ rounds over the previous best attack on Grain v1 that attacks the entire Keyspace. We take the help of the tool $\Delta${\sf Grain}$_{\sf KSA}$, proposed by Banik at ACISP 2014, to track the differential trails induced in the internal state of Grain v1 by any difference in the IV bits, and we prove that a suitably introduced difference in the IV leads to a distinguisher for the output bit produced in the $105^{th}$ round. This, in turn, helps determine the values of $6$ expressions in the Secret Key bits.
Category / Keywords: secret-key cryptography / eStream, Differential Cryptanalysis, Dynamic Cube Attack, Grain v1, Stream Cipher. Date: received 22 Aug 2014, last revised 26 Nov 2014 Contact author: subb at dtu dk Available format(s): PDF | BibTeX Citation Version: 20141126:233508 (All versions of this report) Short URL: ia.cr/2014/652 Discussion forum: Show discussion | Start new discussion