TY - GEN
T1 - A new attack on the LEX stream cipher
AU - Dunkelman, Orr
AU - Keller, Nathan
PY - 2008
Y1 - 2008
N2 - In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we present a key recovery attack on LEX. The attack requires about 2 36.3 bytes of key-stream produced by the same key (possibly under many different IVs), and retrieves the secret key in time of 2112 simple operations. Following a preliminary version of our attack, LEX was discarded from the final portfolio of eSTREAM.
AB - In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we present a key recovery attack on LEX. The attack requires about 2 36.3 bytes of key-stream produced by the same key (possibly under many different IVs), and retrieves the secret key in time of 2112 simple operations. Following a preliminary version of our attack, LEX was discarded from the final portfolio of eSTREAM.
KW - AES
KW - LEX
KW - Stream cipher design
UR - http://www.scopus.com/inward/record.url?scp=58349115749&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-89255-7_33
DO - 10.1007/978-3-540-89255-7_33
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:58349115749
SN - 3540892540
SN - 9783540892540
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 539
EP - 556
BT - Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
T2 - 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008
Y2 - 7 December 2008 through 11 December 2008
ER -