Paper 2012/656

Security Evaluation of Rakaposhi Stream Cipher

Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, and Ron Steinfeld

Abstract

Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV). NLF takes 8-bit inputs and returns a single output bit. The work identifies weaknesses and properties of the cipher. The main observation is that the initialisation procedure has the so-called sliding property. The property can be used to launch distinguishing and key recovery attacks. The distinguisher needs four observations of the related pairs. The key recovery algorithm allows to discover the secret key after observing pairs of . In the proposed related-key attack, the number of related pairs is pairs. The key recovery algorithm allows to discover the secret key after observing related pairs. Further the cipher is studied when the registers enter short cycles. When NLFSR is set to all ones, then the cipher degenerates to a linear feedback shift register with a non-linear filter. Consequently, the initial state (and Secret Key and ) can be recovered with complexity . If DLFSR is set to all zeros, then reduces to a low non-linearity filter function. As the result, the cipher is insecure allowing the adversary to distinguish it from a random cipher after observations of keystream bits. There is also the key recovery algorithm that allows to find the secret key with complexity .

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Rakaposhi Stream CipherRelated Key AttackWeak StateCryptanalysisDistinguishing AttackKey Recovery Attack
Contact author(s)
mohammad orumiehchiha @ mq edu au
History
2012-11-21: received
Short URL
https://ia.cr/2012/656
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/656,
      author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld},
      title = {Security Evaluation of Rakaposhi Stream Cipher},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/656},
      year = {2012},
      url = {https://eprint.iacr.org/2012/656}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.