Journal of Shanghai Jiaotong University ›› 2014, Vol. 48 ›› Issue (10): 1434-1439.

• Radiao Electronics, Telecommunication Technology • Previous Articles     Next Articles

Algebraic Attacks on Trivium-Like Stream Ciphers

SUN Wenlong1,GUAN Jie1   

  1. (1. Information Engineering University, Zhengzhou 450000, China; 2. Beijing Satellite Navigation Center, Beijing 100094, China)
  • Received:2013-12-04 Online:2014-10-28 Published:2014-10-28

Abstract:

Trivium stream cipher is one of the finalists of European eSTREAM project. In order to have a better study of the design ideas of Trivium, two revised Trivium algorithms were typically chosen together with Trivium as the targets. The recovery of internal state was converted into the SAT problem to analyze the security of Trivium-like stream ciphers against algebraic attacks. Six guess strategies were tried, and then the equation systems were fed to MiniSat2.0. Finally, some suggestions for the security of Triviumlike stream ciphers against algebraic attack were given according to the results.

Key words: cryptanalysis, algebraic attacks, satisfiability problem, stream cipher

CLC Number: