Skip to main content
Log in

Improved Guess and Determine attack on the MASHA stream cipher

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Conclusion

So far, no attack on MASHA has been published, besides the security analysis by its designers. In this study, based on optimizing the guess and determination process of the designers’ Guess and Determine attack, we propose an improved Guess and Determine attack on MASHA with time complexity of 2224, which improves their attack by a factor of 296. To the best of our knowledge, this is the best attack on MASHA so far.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Biham E, Dunkelman O. Cryptanalysis of the A5/1 GSM stream cipher. In: Proceedings of INDOCRYPT 2000, Calcutta, 2000. 43–51

  2. Simpson L, Dawson E, Golic J, et al. LILI keystream generator. In: Proceedings of SAC 2000, Ontario, 2000. 248–261

  3. Babbage S, Dodd M. The MICKEY stream ciphers. In: New Stream Cipher Designs. Berlin: Springer, 2008. 191–209

    Chapter  Google Scholar 

  4. Li L, Liu X H, Wang Z, et al. An improved attack on clock-controlled shift registers based on hardware implementation. Sci China Inf Sci, 2013, 56: 112107

    Article  Google Scholar 

  5. Hu J, Li R L, Tang C J. A real-time inversion attack on the GMR-2 cipher used in the satellite phones. Sci China Inf Sci, 2018, 61: 032113

    Article  MathSciNet  Google Scholar 

  6. Kiyomoto S, Tanaka T, Sakurai K. K2: a stream cipher algorithm using dynamic feedback control. In: Proceedings of SECRYPT 2007, Barcelona, 2007. 204–213

  7. Kiyomoto S, Henricksen M, Yap W, et al. MASHA—low cost authentication with a new stream cipher. In: Proceedings of ISC 2011, Xi’an, 2011. 63–78

  8. Feng X, Liu J, Zhou Z, et al. A byte-based Guess and Determine attack on SOSEMANUK. In: Proceedings of ASI-ACRYPT 2010, Singapore, 2010. 146–157

  9. Li R, Li H, Li C, et al. A low data complexity attack on the GMR-2 cipher used in the satellite phones. In: Proceedings of FSE 2013, Singapore, 2013. 485–501

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61602514, 61802437, 61272488, 61202491, 61572516, 61272041, 61772547), National Cryptography Development Fund (Grant No. MMJJ20170125), and National Postdoctoral Program for Innovative Talents (Grant No. BX201700153).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lin Ding.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, L., Gu, D., Wang, L. et al. Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64, 199105 (2021). https://doi.org/10.1007/s11432-018-9878-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-018-9878-1

Navigation