Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
(2011) In Journal of Cryptology 24(3). p.427-445- Abstract
- The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.
In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1585806
- author
- Hell, Martin LU and Johansson, Thomas LU
- organization
- publishing date
- 2011
- type
- Contribution to journal
- publication status
- published
- subject
- keywords
- Stream cipher, F-FCSR-H, F-FCSR-16, Linearization, Cryptanalysis
- in
- Journal of Cryptology
- volume
- 24
- issue
- 3
- pages
- 427 - 445
- publisher
- Springer
- external identifiers
-
- wos:000289212500001
- scopus:79960049203
- ISSN
- 1432-1378
- DOI
- 10.1007/s00145-009-9053-2
- language
- English
- LU publication?
- yes
- id
- 47d65588-0a51-4d82-b7f2-35cb29b777ce (old id 1585806)
- date added to LUP
- 2016-04-01 10:21:40
- date last changed
- 2023-08-31 00:48:20
@article{47d65588-0a51-4d82-b7f2-35cb29b777ce, abstract = {{The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.<br/><br> In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.}}, author = {{Hell, Martin and Johansson, Thomas}}, issn = {{1432-1378}}, keywords = {{Stream cipher; F-FCSR-H; F-FCSR-16; Linearization; Cryptanalysis}}, language = {{eng}}, number = {{3}}, pages = {{427--445}}, publisher = {{Springer}}, series = {{Journal of Cryptology}}, title = {{Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time}}, url = {{http://dx.doi.org/10.1007/s00145-009-9053-2}}, doi = {{10.1007/s00145-009-9053-2}}, volume = {{24}}, year = {{2011}}, }