A Related Key Attack on the Word-Oriented BeepBeep Stream Cipher

Zhiyi Liao, Lin Ding, Zheng Wu
{"title":"A Related Key Attack on the Word-Oriented BeepBeep Stream Cipher","authors":"Zhiyi Liao, Lin Ding, Zheng Wu","doi":"10.1109/CSP58884.2023.00011","DOIUrl":null,"url":null,"abstract":"The word-oriented BeepBeep stream cipher, developed by Driscoll in FSE 2002, is proposed to provide integrity and confidentiality for embedded systems. There has been no attack on BeepBeep published until now. By exploiting a weakness of the BeepBeep stream cipher during its initialization, this paper presents a key recovery attack on the BeepBeep stream cipher in the related key setting. The attack recovers the 192-bit secret key of BeepBeep with a time complexity of $2^{128}$, requiring two related keys, $2^{32}$ chosen IVs and $2^{33}$ keystream words. This is the first cryptanalytic attack on BeepBeep which is significantly better than the exhaustive key search. The result shows that the BeepBeep stream cipher is vulnerable against the related key attack and can not provide the 192-bit security.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"18 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The word-oriented BeepBeep stream cipher, developed by Driscoll in FSE 2002, is proposed to provide integrity and confidentiality for embedded systems. There has been no attack on BeepBeep published until now. By exploiting a weakness of the BeepBeep stream cipher during its initialization, this paper presents a key recovery attack on the BeepBeep stream cipher in the related key setting. The attack recovers the 192-bit secret key of BeepBeep with a time complexity of $2^{128}$, requiring two related keys, $2^{32}$ chosen IVs and $2^{33}$ keystream words. This is the first cryptanalytic attack on BeepBeep which is significantly better than the exhaustive key search. The result shows that the BeepBeep stream cipher is vulnerable against the related key attack and can not provide the 192-bit security.
面向字的BeepBeep流密码的相关密钥攻击
由Driscoll在FSE 2002中开发的面向字的BeepBeep流密码,为嵌入式系统提供了完整性和保密性。到目前为止,还没有针对BeepBeep的攻击。本文利用BeepBeep流密码初始化过程中的弱点,在相关密钥设置中对BeepBeep流密码进行密钥恢复攻击。该攻击恢复了BeepBeep的192位密钥,其时间复杂度为$2^{128}$,需要两个相关的密钥,$2^{32}$选择的IVs和$2^{33}$关键字。这是第一个针对BeepBeep的密码分析攻击,它比穷举式密钥搜索要好得多。结果表明,BeepBeep流密码容易受到相关密钥攻击,不能提供192位的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信