Breaking the F-FCSR-H stream cipher in real time
(2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569- Abstract
- The F-FCSR stream cipher family has been presented a few years ago.
Apart from some flaws in the initial propositions, corrected
in a later stage, there are no known weaknesses of the core of these
algorithms. The hardware oriented version, called FCSR-H, is one of
the ciphers selected for the eSTREAM portfolio.
In this paper we present a new and severe cryptanalytic attack on the
F-FCSR stream cipher family. We give the details of the attack when
applied on F-FCSR-H. The attack requires a few Mbytes of received
sequence and the complexity is low enough to allow the attack to be
performed on a single PC within seconds.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/1270418
- author
- Hell, Martin LU and Johansson, Thomas LU
- organization
- publishing date
- 2008
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Advances in Cryptology / Lecture Notes in Computer Science
- editor
- Pieprzyk, Josef
- volume
- 5350
- pages
- 557 - 569
- publisher
- Springer
- conference name
- ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security
- conference location
- Melbourne, Australia
- conference dates
- 2008-12-07 - 2008-12-11
- external identifiers
-
- wos:000263142700034
- scopus:58349112868
- ISSN
- 0302-9743
- 1611-3349
- language
- English
- LU publication?
- yes
- id
- bd9311b5-5207-4bff-8387-3c34ed8a5b5b (old id 1270418)
- date added to LUP
- 2016-04-01 11:53:31
- date last changed
- 2025-01-14 22:35:56
@inproceedings{bd9311b5-5207-4bff-8387-3c34ed8a5b5b, abstract = {{The F-FCSR stream cipher family has been presented a few years ago. <br/><br> Apart from some flaws in the initial propositions, corrected<br/><br> in a later stage, there are no known weaknesses of the core of these<br/><br> algorithms. The hardware oriented version, called FCSR-H, is one of<br/><br> the ciphers selected for the eSTREAM portfolio.<br/><br> <br/><br> In this paper we present a new and severe cryptanalytic attack on the<br/><br> F-FCSR stream cipher family. We give the details of the attack when<br/><br> applied on F-FCSR-H. The attack requires a few Mbytes of received<br/><br> sequence and the complexity is low enough to allow the attack to be<br/><br> performed on a single PC within seconds.}}, author = {{Hell, Martin and Johansson, Thomas}}, booktitle = {{Advances in Cryptology / Lecture Notes in Computer Science}}, editor = {{Pieprzyk, Josef}}, issn = {{0302-9743}}, language = {{eng}}, pages = {{557--569}}, publisher = {{Springer}}, title = {{Breaking the F-FCSR-H stream cipher in real time}}, url = {{https://lup.lub.lu.se/search/files/2689459/1270420.pdf}}, volume = {{5350}}, year = {{2008}}, }