Paper 2015/828
State-recovery analysis of Spritz
Ralph Ankele, Stefan Koelbl, and Christian Rechberger
Abstract
RC4 suffered from a range of plaintext-recovery attacks using statistical biases, which use substantial, albeit close-to-practical, amounts of known keystream in applications such as TLS or WEP/WPA. Spritz was recently proposed at the rump session of CRYPTO 2014 as a slower redesign of RC4 by Rivest and Schuldt, aiming at reducing the statistical biases that lead to these attacks on RC4.
Even more devastating than those plaintext-recovery attacks from large amounts of keystream would be state- or key-recovery attacks from small amounts of known keystream. For RC4, there is unsubstantiated evidence that they may exist, the situation for Spritz is however not clear, as resistance against such attacks was not a design goal.
In this paper, we provide the first cryptanalytic results on Spritz and introduce three different state recovery algorithms. Our first algorithm recovers an internal state, requiring only a short segment of keystream, with an approximated complexity of
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. LatinCrypt 2015, LNCS 9230 proceedings
- Keywords
- SpritzRC4stream cipherstate recoverycryptanalysis
- Contact author(s)
- Ralph Ankele 2015 @ live rhul ac uk
- History
- 2015-08-26: received
- Short URL
- https://ia.cr/2015/828
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/828, author = {Ralph Ankele and Stefan Koelbl and Christian Rechberger}, title = {State-recovery analysis of Spritz}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/828}, year = {2015}, url = {https://eprint.iacr.org/2015/828} }