Cryptanalysis of Achterbahn-Version 2
(2007) 13th International Workshop, SAC 2006 4356. p.45-55- Abstract
- Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had been successfully cryptanalyzed, the second version, denoted Achterbahn-Version 2, was proposed. This paper demonstrates an attack on this second version. In the attack, a quadratic approximation of the output function is considered. The attack uses less keystream bits than the upper limit given by the designers and the computational complexity is significantly less than exhaustive key search.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/603341
- author
- Hell, Martin LU and Johansson, Thomas LU
- organization
- publishing date
- 2007
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- stream ciphers, Achterbahn, key recovery attack, cryptanalysis
- host publication
- Selected Areas in Cryptography / Lecture notes in computer science)
- volume
- 4356
- pages
- 45 - 55
- publisher
- Springer
- conference name
- 13th International Workshop, SAC 2006
- conference location
- Montreal, Canada
- conference dates
- 2006-08-17 - 2006-08-18
- external identifiers
-
- wos:000251036300004
- scopus:38149113411
- ISSN
- 0302-9743
- 1611-3349
- ISBN
- 978-3-540-74461-0
- DOI
- 10.1007/978-3-540-74462-7_4
- language
- English
- LU publication?
- yes
- id
- 96666324-1703-48b1-bae3-5ce6077d8811 (old id 603341)
- alternative location
- http://www.ecrypt.eu.org/stream/papersdir/2006/042.pdf
- date added to LUP
- 2016-04-01 12:26:38
- date last changed
- 2024-01-08 20:40:23
@inproceedings{96666324-1703-48b1-bae3-5ce6077d8811, abstract = {{Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had been successfully cryptanalyzed, the second version, denoted Achterbahn-Version 2, was proposed. This paper demonstrates an attack on this second version. In the attack, a quadratic approximation of the output function is considered. The attack uses less keystream bits than the upper limit given by the designers and the computational complexity is significantly less than exhaustive key search.}}, author = {{Hell, Martin and Johansson, Thomas}}, booktitle = {{Selected Areas in Cryptography / Lecture notes in computer science)}}, isbn = {{978-3-540-74461-0}}, issn = {{0302-9743}}, keywords = {{stream ciphers; Achterbahn; key recovery attack; cryptanalysis}}, language = {{eng}}, pages = {{45--55}}, publisher = {{Springer}}, title = {{Cryptanalysis of Achterbahn-Version 2}}, url = {{http://dx.doi.org/10.1007/978-3-540-74462-7_4}}, doi = {{10.1007/978-3-540-74462-7_4}}, volume = {{4356}}, year = {{2007}}, }