Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Breaking the F-FCSR-H stream cipher in real time

Hell, Martin LU and Johansson, Thomas LU orcid (2008) ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security 5350. p.557-569
Abstract
The F-FCSR stream cipher family has been presented a few years ago.

Apart from some flaws in the initial propositions, corrected

in a later stage, there are no known weaknesses of the core of these

algorithms. The hardware oriented version, called FCSR-H, is one of

the ciphers selected for the eSTREAM portfolio.



In this paper we present a new and severe cryptanalytic attack on the

F-FCSR stream cipher family. We give the details of the attack when

applied on F-FCSR-H. The attack requires a few Mbytes of received

sequence and the complexity is low enough to allow the attack to be

performed on a single PC within seconds.
Please use this url to cite or link to this publication:
author
and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
Advances in Cryptology / Lecture Notes in Computer Science
editor
Pieprzyk, Josef
volume
5350
pages
557 - 569
publisher
Springer
conference name
ASIACRYPT 2008 14th International Conference on the Theory and Application of Cryptology and Information Security
conference location
Melbourne, Australia
conference dates
2008-12-07 - 2008-12-11
external identifiers
  • wos:000263142700034
  • scopus:58349112868
ISSN
1611-3349
0302-9743
language
English
LU publication?
yes
id
bd9311b5-5207-4bff-8387-3c34ed8a5b5b (old id 1270418)
date added to LUP
2016-04-01 11:53:31
date last changed
2024-02-23 11:33:22
@inproceedings{bd9311b5-5207-4bff-8387-3c34ed8a5b5b,
  abstract     = {{The F-FCSR stream cipher family has been presented a few years ago. <br/><br>
Apart from some flaws in the initial propositions, corrected<br/><br>
in a later stage, there are no known weaknesses of the core of these<br/><br>
algorithms. The hardware oriented version, called FCSR-H, is one of<br/><br>
the ciphers selected for the eSTREAM portfolio.<br/><br>
<br/><br>
In this paper we present a new and severe cryptanalytic attack on the<br/><br>
F-FCSR stream cipher family. We give the details of the attack when<br/><br>
applied on F-FCSR-H. The attack requires a few Mbytes of received<br/><br>
sequence and the complexity is low enough to allow the attack to be<br/><br>
performed on a single PC within seconds.}},
  author       = {{Hell, Martin and Johansson, Thomas}},
  booktitle    = {{Advances in Cryptology / Lecture Notes in Computer Science}},
  editor       = {{Pieprzyk, Josef}},
  issn         = {{1611-3349}},
  language     = {{eng}},
  pages        = {{557--569}},
  publisher    = {{Springer}},
  title        = {{Breaking the F-FCSR-H stream cipher in real time}},
  url          = {{https://lup.lub.lu.se/search/files/2689459/1270420.pdf}},
  volume       = {{5350}},
  year         = {{2008}},
}