You are looking at a specific version 20131125:212847 of this paper. See the latest version.

Paper 2013/780

A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester

Nasser Ramazani Darmian

Abstract

Rabbit stream cipher is one of the finalists of eSTREAM project which uses 128-bit secret keys. Prior to us, the attacks on Rabbit has been all focused on the bias analysis and the best result showed the distinguishing attack with complexity 2136. Our analysis in this paper, is based on chosen IV analysis on reduced N-S round of Rabbit though using multi cube tester. For this purpose we show for a mature cube we could easily identify weak subcubes which increase the probability of distinguishing for an unknown secret key. We also represent with 225 complexity, using one iteration of next state function the keystream is completely distinguishable from random.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
Rabbit Stream CipherCube AttackChosen IV AnalysisDistinguishing
Contact author(s)
nasser_ra21 @ yahoo com
History
2013-11-25: received
Short URL
https://ia.cr/2013/780
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.