A key recovery attack on Edon80
(2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581- Abstract
- Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 final hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 269 simple operations for a keystream of similar length.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/716325
- author
- Hell, Martin LU and Johansson, Thomas LU
- organization
- publishing date
- 2007
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Advances in Cryptology / Lecture Notes in Computer Science
- editor
- Kurosawa, K
- volume
- 4833
- pages
- 568 - 581
- publisher
- Springer
- conference name
- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security
- conference location
- Kuching, Malaysia
- conference dates
- 2007-12-02 - 2007-12-06
- external identifiers
-
- wos:000251436200035
- scopus:38149086790
- ISSN
- 0302-9743
- 1611-3349
- ISBN
- 978-3-540-76899-9
- DOI
- 10.1007/978-3-540-76900-2_35
- language
- English
- LU publication?
- yes
- id
- 48c04c9c-131d-4868-af82-5ee032f99bba (old id 716325)
- alternative location
- http://www.ecrypt.eu.org/stream/papersdir/2007/044.pdf
- date added to LUP
- 2016-04-01 12:22:53
- date last changed
- 2025-01-02 15:56:13
@inproceedings{48c04c9c-131d-4868-af82-5ee032f99bba, abstract = {{Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 final hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 269 simple operations for a keystream of similar length.}}, author = {{Hell, Martin and Johansson, Thomas}}, booktitle = {{Advances in Cryptology / Lecture Notes in Computer Science}}, editor = {{Kurosawa, K}}, isbn = {{978-3-540-76899-9}}, issn = {{0302-9743}}, language = {{eng}}, pages = {{568--581}}, publisher = {{Springer}}, title = {{A key recovery attack on Edon80}}, url = {{http://dx.doi.org/10.1007/978-3-540-76900-2_35}}, doi = {{10.1007/978-3-540-76900-2_35}}, volume = {{4833}}, year = {{2007}}, }