AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time

@article{Vielhaber2009AIDABB,
  title={AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time},
  author={Michael Vielhaber},
  journal={IACR Cryptology ePrint Archive},
  year={2009},
  volume={2009},
  pages={402}
}
The stream cipher BIVIUM (both BIVIUM-A and BIVIUM-B), a modification of the eSTREAM finalist TRIVIUM, can be broken completely by the Algebraic IV Differential Attack, AIDA, using 227.5 simulations or one minute of dual core processing. AIDA uses the subspaces of two 32-dimensional vector spaces over subsets of IV bits to recover 56 of the 80 key bits. The remaining 24 key bits are most easily determined by brute force search. We applied the Fast Reed-Muller Transform to speed up the search… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 12 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 18 REFERENCES

Cryptanalytic results on Trivium, eSTREAM report 2006/039

H. Raddum
  • 2006
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

AIDA vs. TRIVIUM 793:1152 Final Score 980:1152

M. Vielhaber
  • Rump Session Eurocrypt
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Cube Attacks on Tweakable Black Box Polynomials

  • IACR Cryptology ePrint Archive
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack

  • IACR Cryptology ePrint Archive
  • 2007
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Chosen IV algebraic attack on One.Fivium

  • 2008 3rd International Conference on Intelligent System and Knowledge Engineering
  • 2008
VIEW 1 EXCERPT