Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Cryptanalysis of Achterbahn-Version 2

Hell, Martin LU and Johansson, Thomas LU orcid (2007) 13th International Workshop, SAC 2006 4356. p.45-55
Abstract
Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had been successfully cryptanalyzed, the second version, denoted Achterbahn-Version 2, was proposed. This paper demonstrates an attack on this second version. In the attack, a quadratic approximation of the output function is considered. The attack uses less keystream bits than the upper limit given by the designers and the computational complexity is significantly less than exhaustive key search.
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
stream ciphers, Achterbahn, key recovery attack, cryptanalysis
host publication
Selected Areas in Cryptography / Lecture notes in computer science)
volume
4356
pages
45 - 55
publisher
Springer
conference name
13th International Workshop, SAC 2006
conference location
Montreal, Canada
conference dates
2006-08-17 - 2006-08-18
external identifiers
  • wos:000251036300004
  • scopus:38149113411
ISSN
1611-3349
0302-9743
ISBN
978-3-540-74461-0
DOI
10.1007/978-3-540-74462-7_4
language
English
LU publication?
yes
id
96666324-1703-48b1-bae3-5ce6077d8811 (old id 603341)
alternative location
http://www.ecrypt.eu.org/stream/papersdir/2006/042.pdf
date added to LUP
2016-04-01 12:26:38
date last changed
2024-01-08 20:40:23
@inproceedings{96666324-1703-48b1-bae3-5ce6077d8811,
  abstract     = {{Achterbahn is one of the stream cipher proposals in the eSTREAM project. After the first version had been successfully cryptanalyzed, the second version, denoted Achterbahn-Version 2, was proposed. This paper demonstrates an attack on this second version. In the attack, a quadratic approximation of the output function is considered. The attack uses less keystream bits than the upper limit given by the designers and the computational complexity is significantly less than exhaustive key search.}},
  author       = {{Hell, Martin and Johansson, Thomas}},
  booktitle    = {{Selected Areas in Cryptography / Lecture notes in computer science)}},
  isbn         = {{978-3-540-74461-0}},
  issn         = {{1611-3349}},
  keywords     = {{stream ciphers; Achterbahn; key recovery attack; cryptanalysis}},
  language     = {{eng}},
  pages        = {{45--55}},
  publisher    = {{Springer}},
  title        = {{Cryptanalysis of Achterbahn-Version 2}},
  url          = {{http://dx.doi.org/10.1007/978-3-540-74462-7_4}},
  doi          = {{10.1007/978-3-540-74462-7_4}},
  volume       = {{4356}},
  year         = {{2007}},
}