Paper 2025/566
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities
Abstract
Fruit-F is a lightweight short-state stream cipher designed by Ghafari et al. The authors designed this version of the cipher, after earlier versions of the cipher viz. Fruit 80/v2 succumbed to correlation attacks. The primary motivation behind this design seemed to be preventing correlation attacks. Fruit-F has a Grain-like structure with two state registers of size 50 bits each. In addition, the cipher uses an 80-bit secret key and an 80-bit IV. The authors use a complex key-derivation function to update the non-linear register which prevents the same key-bit alignment across fixed-length window of keystream bits, which is essentially what stops the correlation attacks.
In this paper, we first present two attacks against Fruit-F. The first attack stems from the fact that the key-derivation can be rewritten as the Boolean xor of two key-dependent terms one of which is the Boolean OR of two bits of the key. Using this we show that the cipher does not offer 80-bit security: the effective key space of Fruit-F is slightly less than
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Minor revision. ACISP 2025
- Keywords
- Stream cipherFruit-FKey-derivation weaknessDifferential attack
- Contact author(s)
-
subhadeep banik @ usi ch
hailun yan @ ucas ac cn - History
- 2025-03-28: approved
- 2025-03-28: received
- See all versions
- Short URL
- https://ia.cr/2025/566
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/566, author = {Subhadeep Banik and Hailun Yan}, title = {Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/566}, year = {2025}, url = {https://eprint.iacr.org/2025/566} }