2005 | OriginalPaper | Buchkapitel
Attack the Dragon
verfasst von : Håkan Englund, Alexander Maximov
Erschienen in: Progress in Cryptology - INDOCRYPT 2005
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream. The internal state of the cipher is 1088 bits, i.e., any kinds of TMD attacks are not applicable. In this paper we present two statistical distinguishers that distinguish Dragon from a random source both requiring around
O
(2
155
) words of the keystream. In the first scenario the time complexity is around
O
(2
155 + 32
) with the memory complexity
O
(2
32
), whereas the second scenario needs only
O
(2
155
) of time, but
O
(2
96
) of memory. The attack is based on a statistical weakness introduced into the keystream by the filter function
F
. This is the first paper presenting an attack on Dragon, and it shows that the cipher does not provide full security when the key of size 256 bits is used.