Sciweavers

FSE
2007
Springer

Two General Attacks on Pomaranch-Like Keystream Generators

14 years 6 months ago
Two General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with complexity less than exhaustive keysearch. The first attack is a distinguisher which needs keystream from only one or a few IVs to succeed. The attack is not only successful on Pomaranch Version 3 but has also less computational complexity than all previously known distinguishers for the first two versions of the cipher. The second attack is an attack which requires keystream from an amount of IVs exponential in the state size. It can be used as a distinguisher but it can also be used to predict future keystream bits corresponding to an IV if the first few bits are known. The attack will succeed on all versions of Pomaranch with complexities much lower than previously known attacks.
Håkan Englund, Martin Hell, Thomas Johansson
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where FSE
Authors Håkan Englund, Martin Hell, Thomas Johansson
Comments (0)