Skip to main content
Log in

Fast correlation attack on stream cipher ABC v3

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

ABC v3 is a stream cipher submitted to the ECRYPT eStream project and has entered the second evaluation phase. Its key length is 128 bits. In this paper, we find large numbers of new weak keys of ABC family and introduce a method to search for them, and then apply a fast correlation attack to break ABC v3 with weak keys. We show that there are at least 2103.71 new weak keys in ABC v3. Recovering the internal state of a weak key requires 236.05 keystream words and 250.56 operations. The attack can be applied to ABC v1 and v2 with the same complexity as that of ABC v3. However, the number of weak keys of ABC v1 as well as ABC v2 decreases to 297 + 295.19. It reveals that ABC v3 incurs more weak keys than that of ABC v1 and v2.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anashin V, Bogdanov A, Kizhvatov I. ABC—a new fast flexible stream cipher specification, version 3. Available at http://www.ecrypt.eu.org/stream/p2ciphe-rs/abc/abc_p2.pdf

  2. Anashin V, Bogdanov A, Kizhvatov I, et al. ABC: A new fast flexible stream cipher. Available at http://www.ecrypt.eu.org/stream/ciphers/abc/abc.pdf

  3. Berbain C, Gilbert H. Cryptanalysis of ABC. Available at http://www.ecrypt.eu.org/stream/papersdir/048.pdf

  4. Khazaei S. Divide and conquer attack on ABC stream cipher. Available at http://www.ecrypt.eu.org/stream/papersdir/052.pdf

  5. Anashin V, Bogdanov A, Kizhvatov I. Increasing the ABC stream cipher period. Available at http://www.ecrypt.eu.org/stream/papersdir/050.pdf, also available at http://crypto.rsuh.ru/papers/abc-spec-v2.pdf

  6. Wu H J, Preneel B. Cryptanalysis of ABC v2. In: Selected Areas in Cryptography 2006 (SAC 2006). Springer LNCS, to appear. Also available at http://www.ecrypt.eu.org/stream/papersdir/2006/029.pdf

  7. Zhang H N, Wang S H, Wang X Y. Two linear expressions with probability advantages in symmetric ciphers. Available at http://www.ecrypt.eu.org/strea-m/papersdir/2006/046.pdf

  8. Meier W, Staffelbach O. Fast correlation attacks on stream ciphers. J Cryptol, 1989, 1(3): 159–176

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to XiaoYun Wang.

Additional information

Supported by the National Natural Science Foundation of China (Grant Nos. 90604036 and 60525201) and the 973 Project (Grant No. 2007CB807902)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, H., Li, L. & Wang, X. Fast correlation attack on stream cipher ABC v3. Sci. China Ser. F-Inf. Sci. 51, 936–947 (2008). https://doi.org/10.1007/s11432-008-0064-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-008-0064-7

Keywords

Navigation