Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

Hell, Martin LU and Johansson, Thomas LU orcid (2011) In Journal of Cryptology 24(3). p.427-445
Abstract
The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.

In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Contribution to journal
publication status
published
subject
keywords
Stream cipher, F-FCSR-H, F-FCSR-16, Linearization, Cryptanalysis
in
Journal of Cryptology
volume
24
issue
3
pages
427 - 445
publisher
Springer
external identifiers
  • wos:000289212500001
  • scopus:79960049203
ISSN
1432-1378
DOI
10.1007/s00145-009-9053-2
language
English
LU publication?
yes
id
47d65588-0a51-4d82-b7f2-35cb29b777ce (old id 1585806)
date added to LUP
2016-04-01 10:21:40
date last changed
2023-08-31 00:48:20
@article{47d65588-0a51-4d82-b7f2-35cb29b777ce,
  abstract     = {{The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. Two variants, F-FCSR-H and F-FCSR-16, were proposed in the eSTREAM project, and F-FCSR-H v2 is one of the ciphers selected for the eSTREAM portfolio.<br/><br>
In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied to F-FCSR-H v2 and F-FCSR-16. The attack requires a few Mbytes of received sequence, and the complexity is low enough to allow the attack to be performed on a single PC within seconds.}},
  author       = {{Hell, Martin and Johansson, Thomas}},
  issn         = {{1432-1378}},
  keywords     = {{Stream cipher; F-FCSR-H; F-FCSR-16; Linearization; Cryptanalysis}},
  language     = {{eng}},
  number       = {{3}},
  pages        = {{427--445}},
  publisher    = {{Springer}},
  series       = {{Journal of Cryptology}},
  title        = {{Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time}},
  url          = {{http://dx.doi.org/10.1007/s00145-009-9053-2}},
  doi          = {{10.1007/s00145-009-9053-2}},
  volume       = {{24}},
  year         = {{2011}},
}