Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

Authors

  • Bin Zhang University of Chinese Academy of Sciences, Beijing, 100049, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China; State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China; Guizhou shujubao Network Technology Co., Ltd, Guizhou, China; Zhongguancun Laboratory, Beijing, China
  • Ruitao Liu University of Chinese Academy of Sciences, Beijing, 100049, China; Trusted Computing and Information Assurance Laboratory, State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China; Zhongguancun Laboratory, Beijing, China
  • Xinxin Gong State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China
  • Lin Jiao State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China

DOI:

https://doi.org/10.46586/tosc.v2023.i4.83-111

Keywords:

Fast correlation attack, Stream ciphers, Covering codes, Sosemanuk, Linear feedback shift register (LFSR)

Abstract

In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum construction of covering codes in decoding phase which approximates the random vectors to a nearest codeword in a linear code. The new strategy provides large flexibility for the adversary and could reduce the time/memory/data complexities significantly. As a case study, we carefully revisit Sosemanuk and demonstrate a state recovery attack with a time complexity of 2134.8, which is 220 times faster than achievable before by the same kind of attack and is the fastest one among all known attacks so far. Our result indicates an inefficiency in longer keys than 135 bits and depicts that the security margin of Sosemanuk is around 28 for the 128-bit security for the first time.

Downloads

Published

2023-12-08

How to Cite

Zhang, B., Liu, R., Gong, X., & Jiao, L. (2023). Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher. IACR Transactions on Symmetric Cryptology, 2023(4), 83–111. https://doi.org/10.46586/tosc.v2023.i4.83-111

Issue

Section

Articles