This item still needs to be validated !
Title: Resynchronization Attacks on WG and LEX
Authors: Wu, Hongjun ×
Preneel, Bart #
Issue Date: 2006
Publisher: Springer
Series Title: Lecture Notes in Computer Science vol:4047 pages:422-432
Conference: 13th International Workshop on Fast Software Encryption location:Graz, AUSTRIA date:March 15-17, 2006
Abstract: WG and LEX are two stream ciphers submitted to eStream the ECRYPT stream cipher project. In this paper, we point out security flaws in the resynchronization of these two ciphers. The resynchronization of WG is vulnerable to a differential attack. For WG with 80-bit key and 80-bit IV, 48 bits of the secret key can be recovered with about 2(31.3) chosen IVs. For each chosen IV, only the first four keystream bits are needed in the attack. The resynchronization of LEX is vulnerable to a slide attack. If a key is used with about 2(60.8) random IVs, and 20,000 keystream bytes are generated from each IV, then the key of the strong version of LEX could be recovered easily with a slide attack. The resynchronization attack on WG and LEX shows that block cipher related attacks are powerful in analyzing non-linear resynchronization mechanisms.
ISSN: 0302-9743
Publication status: published
KU Leuven publication type: IT
Appears in Collections:Electrical Engineering - miscellaneous
ESAT - STADIUS, Stadius Centre for Dynamical Systems, Signal Processing and Data Analytics
× corresponding author
# (joint) last author

Files in This Item:
File Status SizeFormat
article-776.pdf Published 199KbAdobe PDFView/Open Request a copy

These files are only available to some KU Leuven Association staff members


All items in Lirias are protected by copyright, with all rights reserved.

© Web of science