Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

A key recovery attack on Edon80

Hell, Martin LU and Johansson, Thomas LU orcid (2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581
Abstract
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 final hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 269 simple operations for a keystream of similar length.
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
Advances in Cryptology / Lecture Notes in Computer Science
editor
Kurosawa, K
volume
4833
pages
568 - 581
publisher
Springer
conference name
ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security
conference location
Kuching, Malaysia
conference dates
2007-12-02 - 2007-12-06
external identifiers
  • wos:000251436200035
  • scopus:38149086790
ISSN
1611-3349
0302-9743
ISBN
978-3-540-76899-9
DOI
10.1007/978-3-540-76900-2_35
language
English
LU publication?
yes
id
48c04c9c-131d-4868-af82-5ee032f99bba (old id 716325)
alternative location
http://www.ecrypt.eu.org/stream/papersdir/2007/044.pdf
date added to LUP
2016-04-01 12:22:53
date last changed
2024-01-08 18:32:56
@inproceedings{48c04c9c-131d-4868-af82-5ee032f99bba,
  abstract     = {{Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 final hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 269 simple operations for a keystream of similar length.}},
  author       = {{Hell, Martin and Johansson, Thomas}},
  booktitle    = {{Advances in Cryptology / Lecture Notes in Computer Science}},
  editor       = {{Kurosawa, K}},
  isbn         = {{978-3-540-76899-9}},
  issn         = {{1611-3349}},
  language     = {{eng}},
  pages        = {{568--581}},
  publisher    = {{Springer}},
  title        = {{A key recovery attack on Edon80}},
  url          = {{http://dx.doi.org/10.1007/978-3-540-76900-2_35}},
  doi          = {{10.1007/978-3-540-76900-2_35}},
  volume       = {{4833}},
  year         = {{2007}},
}