A new attack on the LEX stream cipher

Orr Dunkelman, Nathan Keller

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we present a key recovery attack on LEX. The attack requires about 2 36.3 bytes of key-stream produced by the same key (possibly under many different IVs), and retrieves the secret key in time of 2112 simple operations. Following a preliminary version of our attack, LEX was discarded from the final portfolio of eSTREAM.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Pages539-556
Number of pages18
DOIs
StatePublished - 2008
Externally publishedYes
Event14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008 - Melbourne, VIC, Australia
Duration: 7 Dec 200811 Dec 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5350 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008
Country/TerritoryAustralia
CityMelbourne, VIC
Period7/12/0811/12/08

Keywords

  • AES
  • LEX
  • Stream cipher design

Fingerprint

Dive into the research topics of 'A new attack on the LEX stream cipher'. Together they form a unique fingerprint.

Cite this