Abstract
In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE’03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks.
The first attack requires 288 basic operations and processes only 212 words of chosen plaintext in order to recover the secret key for any length up to 256 bits. However, it assumes the attacker can force nonces to be used twice. Our second attack relies on weaker assumptions. It is a distinguishing attack that detects internal state collisions after 2114 words of chosen plaintext.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of Stream Ciphers with Linear Masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)
Ekdahl, P., Johansson, T.: SNOW - a New Stream Cipher. In: First Open NESSIE Workshop, KU-Leuven (2000), Submission to NESSIE, Available at http://www.it.lth.se/cryptology/snow/
Ekdahl, P., Johansson, T.: Distinguishing Attacks on SOBER-t16 and t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 210–224. Springer, Heidelberg (2002)
Ferguson, N.: Michael: an improved MIC for 802.11 WEP. Document 2-020, Available at http://grouper.ieee.org/groups/802/11/
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix, Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330–346. Springer, Heidelberg (2003) (to appear)
FIPS PUB 81. DES Modes of Operation (1980)
Fluhrer, S.: Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 135–143. Springer, Heidelberg (2001)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Gligor, V.D., Donescu, P.: Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 108–192. Springer, Heidelberg (2001)
Halevi, S., Coppersmith, D., Jutla, C.: Scream: a Software-efficient Stream Cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)
Hawkes, P., Rose, G.: Primitive Specification and Supporting Documentation for SOBER-t32. In: First Open NESSIE Workshop (2000) (submission to NESSIE)
Jutla, C.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 529–544. Springer, Heidelberg (2001)
Lipmaa, H., Moriai, S.: Efficient Algorithms for Computing Differential Properties of Addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 336–350. Springer, Heidelberg (2001)
NESSIE - New European Schemes for Signature, Integrity and Encryption, http://www.cryptonessie.org
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB/ A Block-cipher Mode of Operation for Efficient Authenticated Encryption. In: Eight ACM Conference on Computer and Communications Security (CCS-8), pp. 196–205. ACM Press, New York (2001)
Rogaway, P., Coppersmith, D.: A Software-optimized Encryption Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 56–63. Springer, Heidelberg (1994)
Wallen, J.: Linear Approximations of Addition Modulo 2n. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 261–273. Springer, Heidelberg (2003)
IEEE P802.11, The Working Group for Wireless LANs, http://grouper.ieee.org/groups/802/11/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muller, F. (2004). Differential Attacks against the Helix Stream Cipher. In: Roy, B., Meier, W. (eds) Fast Software Encryption. FSE 2004. Lecture Notes in Computer Science, vol 3017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25937-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-25937-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22171-5
Online ISBN: 978-3-540-25937-4
eBook Packages: Springer Book Archive