Sciweavers

FSE
1998
Springer

Cryptanalysis of TWOPRIME

14 years 4 months ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows us to recover half the key with minimal effort. Next, we show that the various bytes are insufficiently mixed by these layers, enabling an attack similar to those on two-loop Vigenere ciphers to recover the remainder of the key. Combining these techniques lets us recover the entire TWOPRIME key. We require the generator to produce 233 blocks (235 bytes), or 19 hours worth of output, of which we examine about one million blocks (223 bytes); the computational workload can be estimated at 228 operations. Another set of attacks trades off texts for time, reducing the amount of known plaintext needed to just eight blocks (64 bytes), while needing 232 time and 232 space. We also show how to break two variants of TWOPRIME presented in the original paper.
Don Coppersmith, David Wagner, Bruce Schneier, Joh
Added 05 Aug 2010
Updated 05 Aug 2010
Type Conference
Year 1998
Where FSE
Authors Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
Comments (0)