Abstract
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different functional properties, compared to the other candidates. We present simple related-key phenomena in Moustique that lead to the generation of strongly correlated keystreams and to powerful key-recovery attacks. Our best key-recovery attack requires only 238 steps in the related-key scenario. Since the relevance of related-key properties is sometimes called into question, we also show how the described effects can help speed up exhaustive search (without related keys), thereby reducing the effective key length of Moustique from 96 bits to 90 bits.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bernstein, D.J.: Related-key attacks: who cares? eSTREAM discussion forum (June 22, 2005), http://www.ecrypt.eu.org/stream/phorum/
Biham, E.: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398–409. Springer, Heidelberg (1994) (extended Abstract)
Daemen, J., Kitsos, P.: The Self-Synchronising Stream Cipher Mosquito. eStream Report 2005/018, http://www.ecrypt.eu.org/stream/papers.html
Daemen, J., Kitsos, P.: The Self-Synchronising Stream Cipher Moustique, http://www.ecrypt.eu.org/stream/mosquitop3.html
Daemen, J., Lano, J., Preneel, B.: Chosen Ciphertext Attack on SSS. eStream Report 2005/044), http://www.ecrypt.eu.org/stream/papers.html
ECRYPT. The eSTREAM project, http://www.ecrypt.eu.org/stream/
Joux, A., Muller, F.: Chosen-ciphertext attacks against Mosquito. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 390–404. Springer, Heidelberg (2006)
Rose, G., Hawkes, P., Paddon, M., Wiggers de Vries, M.: Primitive Specification for SSS. eStream Report 2005/028, http://www.ecrypt.eu.org/stream/papers.html
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Käsper, E., Rijmen, V., Bjørstad, T.E., Rechberger, C., Robshaw, M., Sekar, G. (2008). Correlated Keystreams in Moustique . In: Vaudenay, S. (eds) Progress in Cryptology – AFRICACRYPT 2008. AFRICACRYPT 2008. Lecture Notes in Computer Science, vol 5023. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68164-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-68164-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68159-5
Online ISBN: 978-3-540-68164-9
eBook Packages: Computer ScienceComputer Science (R0)