Advanced

Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

Hell, Martin LU and Johansson, Thomas LU (2011) In Journal of Cryptology 24(3). p.427-445
Abstract
The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.

In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Contribution to journal
publication status
published
subject
keywords
Stream cipher, F-FCSR-H, F-FCSR-16, Linearization, Cryptanalysis
in
Journal of Cryptology
volume
24
issue
3
pages
427 - 445
publisher
Springer
external identifiers
  • wos:000289212500001
  • scopus:79960049203
ISSN
1432-1378
DOI
10.1007/s00145-009-9053-2
language
English
LU publication?
yes
id
47d65588-0a51-4d82-b7f2-35cb29b777ce (old id 1585806)
date added to LUP
2010-04-22 12:15:13
date last changed
2017-01-01 03:30:55
@article{47d65588-0a51-4d82-b7f2-35cb29b777ce,
  abstract     = {The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.<br/><br>
In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.},
  author       = {Hell, Martin and Johansson, Thomas},
  issn         = {1432-1378},
  keyword      = {Stream cipher,F-FCSR-H,F-FCSR-16,Linearization,Cryptanalysis},
  language     = {eng},
  number       = {3},
  pages        = {427--445},
  publisher    = {Springer},
  series       = {Journal of Cryptology},
  title        = {Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time},
  url          = {http://dx.doi.org/10.1007/s00145-009-9053-2},
  volume       = {24},
  year         = {2011},
}