Paper 2025/566

Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities

Subhadeep Banik, Universita della Svizzera Italiana, Lugano, Switzerland
Hailun Yan, University of Chinese Academy of Sciences, Beijing, China, State Key Laboratory of Cryptology, P. O. Box 5159, Beijing 100878, China
Abstract

Fruit-F is a lightweight short-state stream cipher designed by Ghafari et al. The authors designed this version of the cipher, after earlier versions of the cipher viz. Fruit 80/v2 succumbed to correlation attacks. The primary motivation behind this design seemed to be preventing correlation attacks. Fruit-F has a Grain-like structure with two state registers of size 50 bits each. In addition, the cipher uses an 80-bit secret key and an 80-bit IV. The authors use a complex key-derivation function to update the non-linear register which prevents the same key-bit alignment across fixed-length window of keystream bits, which is essentially what stops the correlation attacks. In this paper, we first present two attacks against Fruit-F. The first attack stems from the fact that the key-derivation can be rewritten as the Boolean xor of two key-dependent terms one of which is the Boolean OR of two bits of the key. Using this we show that the cipher does not offer 80-bit security: the effective key space of Fruit-F is slightly less than , i.e. a simple brute force attack costs around time. The second is a differential attack using the cipher's complex initialization process. We show that under some given conditions, it is possible to have two initial vectors and that produce identical keystream vectors with any given key. Using this as a distinguisher, it is possible to collect enough linear and quadratic equations of the secret key to find it in practical time with very few keystream bits.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Minor revision. ACISP 2025
Keywords
Stream cipherFruit-FKey-derivation weaknessDifferential attack
Contact author(s)
subhadeep banik @ usi ch
hailun yan @ ucas ac cn
History
2025-03-28: approved
2025-03-28: received
See all versions
Short URL
https://ia.cr/2025/566
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/566,
      author = {Subhadeep Banik and Hailun Yan},
      title = {Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/566},
      year = {2025},
      url = {https://eprint.iacr.org/2025/566}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.