Paper 2019/809

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet

Yosuke Todo, Willi Meier, and Kazumaro Aoki

Abstract

Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challenging task due to the well-known security criteria, i.e., the state size of stream ciphers must be at least twice the key size. The designers of Sprout addressed this issue by involving the secret key not only in the initialization but also in the keystream generation, and the state size of such stream ciphers can be smaller than twice the key size. After the seminal work, some small-state stream ciphers have been proposed such as Fruit, Plantlet, and LIZARD. Unlike conventional stream ciphers, these small-state stream ciphers have the limitation of keystream bits that can be generated from the same key and IV pair. In this paper, our motivation is to show whether the data limitation claimed by the designers is proper or not. The correlation attack is one of the attack methods exploiting many keystream bits generated from the same key and IV pair, and we apply it to Fruit-80 and Plantlet. As a result, we can break the full Fruit-80, i.e., the designers' data limitation is not sufficient. We can also recover the secret key of Plantlet if it allows about $2^{53}$ keystream bits from the same key and IV pair.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. SAC 2019
Keywords
Small-state stream cipherGrainCorrelation attack
Contact author(s)
todo yosuke @ gmail com
History
2019-07-14: received
Short URL
https://ia.cr/2019/809
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/809,
      author = {Yosuke Todo and Willi Meier and Kazumaro Aoki},
      title = {On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet},
      howpublished = {Cryptology ePrint Archive, Paper 2019/809},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/809}},
      url = {https://eprint.iacr.org/2019/809}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.