Paper 2022/148
Attacks on the Firekite cipher
Abstract
Firekite is a synchronous stream cipher using a pseudo-random number generator (PRNG) whose security relies on the hardness of the \textit{Learning Parity with Noise} (LPN) problem. It is one of a few LPN-based symmetric encryption schemes and it can be very efficiently implemented on a low-end SoC FPGA. The designers, Bogos, Korolija, Locher, and Vaudenay, demonstrated appealing properties of Firekite such as requiring only one source of cryptographically strong bits, small key size, high attainable throughput, and a concrete measurement for the bit level security depending on the selected practical parameters.
We propose distinguishing and key-recovery attacks on Firekite by exploiting the structural properties of its PRNG. We adopt several \textit{birthday-paradox} techniques to show that a particular sum of Firekite's output has a low Hamming weight with higher probability than the random case. We achieve the best distinguishing attacks with complexities
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- PRNG Firekite PRNG Birthday paradox k-list algorithm LPN LPN-based symmetric encryption
- Contact author(s)
-
thomas johansson @ eit lth se
willi meier @ fhnw ch
vu nguyen @ eit lth se - History
- 2022-05-31: last of 3 revisions
- 2022-02-12: received
- See all versions
- Short URL
- https://ia.cr/2022/148
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/148, author = {Thomas Johansson and Willi Meier and Vu Nguyen}, title = {Attacks on the Firekite cipher}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/148}, year = {2022}, url = {https://eprint.iacr.org/2022/148} }