2007 | OriginalPaper | Buchkapitel
Differential-Linear Attacks Against the Stream Cipher Phelix
verfasst von : Hongjun Wu, Bart Preneel
Erschienen in: Fast Software Encryption
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
The previous key recovery attacks against Helix obtain the key with about 2
88
operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 2
35.6
chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 2
34
chosen nonces and 2
37
chosen plaintext words, the key of Phelix can be recovered with about 2
41.5
operations.