Related-Key Differential Slide Attack Against Fountain V1

Raluca Posteuca

Abstract

The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the construction of 32 relations on key bits, with time complexity around $17\times 2^{80}$. The success of the attack is around 98%. We also present some properties of the internal state transitions that allow the identification of (key-iv-ad) input data that produce identical ciphertexts, with probability of $2^{-32}$.

Available format(s)
Category
Secret-key cryptography
Publication info
Published elsewhere. RCD-2019
Keywords
lightweight cryptographyFountainslide attacksinternal states collisionsinvertible states transition.
Contact author(s)
raluca posteuca @ esat kuleuven be
History
Short URL
https://ia.cr/2019/920

CC BY

BibTeX

@misc{cryptoeprint:2019/920,
author = {Raluca Posteuca},
title = {Related-Key Differential Slide Attack Against Fountain V1},
howpublished = {Cryptology ePrint Archive, Paper 2019/920},
year = {2019},
note = {\url{https://eprint.iacr.org/2019/920}},
url = {https://eprint.iacr.org/2019/920}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.