Paper 2013/268

Dynamic Cube Attack on Grain-v1

Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, and Mohammad Reza Aref

Abstract

This article aims to present dynamic cube attack on Grain-v1. Dynamic cube attack finds the secret key by using distinguishers gained from structural weakness. The main idea of dynamic cube attack lies in simplifying the output function. After making it simpler, dynamic cube attack will be able to exploit distinguishing attack for recovering the secret key. In this paper, we investigate Grain-v1 to which key recovery attack has never been applied because its feedback function is so sophisticated. we apply dynamic cube attack on it by utilizing both intelligent choices of Initial Value variables and appropriate simplifications. Our attack is done in feasible time complexity, and it recovers all bits of the key while the number of initialization rounds in Grain-v1 is decreased to 100. This attack is faster than exhaustive search by a factor $2^{32}$.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
stream cipherGrain-v1dynamic cube attackkey recovery attack
Contact author(s)
md rahimy @ gmail com
History
2013-05-25: revised
2013-05-13: received
See all versions
Short URL
https://ia.cr/2013/268
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/268,
      author = {Majid Rahimi and Mostafa Barmshory and Mohammad Hadi Mansouri and Mohammad Reza Aref},
      title = {Dynamic Cube Attack on Grain-v1},
      howpublished = {Cryptology ePrint Archive, Paper 2013/268},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/268}},
      url = {https://eprint.iacr.org/2013/268}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.