Cryptanalysis of the Full Spritz Stream Cipher

@article{Banik2016CryptanalysisOT,
  title={Cryptanalysis of the Full Spritz Stream Cipher},
  author={S. Banik and T. Isobe},
  journal={IACR Cryptol. ePrint Arch.},
  year={2016},
  volume={2016},
  pages={92}
}
  • S. Banik, T. Isobe
  • Published 2016
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on a short-term bias in the first two bytes of a keystream and a long-term bias in the first two bytes of every cycle of N keystream bytes, where N is the size of the internal permutation. Our attacks are able to distinguish a keystream of the full Spritz from a… CONTINUE READING
    15 Citations

    Figures, Tables, and Topics from this paper

    Spritz - a spongy RC4-like stream cipher and hash function
    • 77
    • PDF
    Hardware Accelerator for Stream Cipher Spritz
    • 1
    • PDF
    On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
    • G. Paul, S. Ray
    • Mathematics, Computer Science
    • IACR Cryptol. ePrint Arch.
    • 2015
    • 6
    • PDF
    Improved Secure Stream Cipher for Cloud Computing
    • PDF
    Settling the mystery of Zr = r in RC4
    • 2
    • PDF
    Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
    • PDF
    Application of Spritz Encryption in Smart Meters to Protect Consumer Data
    • 3
    • PDF

    References

    SHOWING 1-10 OF 28 REFERENCES
    Spritz - a spongy RC4-like stream cipher and hash function
    • 77
    • PDF
    On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
    • 41
    • PDF
    Full Plaintext Recovery Attack on Broadcast RC4
    • 59
    • PDF
    New State Recovery Attack on RC4
    • 86
    • Highly Influential
    • PDF
    State-Recovery Analysis of Spritz
    • 5
    • Highly Influential
    • PDF
    How to Recover Any Byte of Plaintext on RC4
    • 17
    • PDF
    Security Analysis of the RC4+ Stream Cipher
    • 9
    Some security results of the RC4+ stream cipher
    • 6
    • PDF
    A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
    • 182
    • PDF
    Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
    • 7
    • PDF