Paper 2019/920
Related-Key Differential Slide Attack Against Fountain V1
Raluca Posteuca
Abstract
The stream cipher FOUNTAIN was introduced in April 2019 as one of the candidates in the NIST lightweight crypto standardization process. In this paper we introduce a slide attack that leads to the construction of 32 relations on key bits, with time complexity around $17\times 2^{80}$. The success of the attack is around 98%. We also present some properties of the internal state transitions that allow the identification of (key-iv-ad) input data that produce identical ciphertexts, with probability of $2^{-32}$.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. RCD-2019
- Keywords
- lightweight cryptographyFountainslide attacksinternal states collisionsinvertible states transition.
- Contact author(s)
- raluca posteuca @ esat kuleuven be
- History
- 2019-08-13: received
- Short URL
- https://ia.cr/2019/920
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/920, author = {Raluca Posteuca}, title = {Related-Key Differential Slide Attack Against Fountain V1}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/920}, year = {2019}, url = {https://eprint.iacr.org/2019/920} }