{"title":"面向字的BeepBeep流密码的相关密钥攻击","authors":"Zhiyi Liao, Lin Ding, Zheng Wu","doi":"10.1109/CSP58884.2023.00011","DOIUrl":null,"url":null,"abstract":"The word-oriented BeepBeep stream cipher, developed by Driscoll in FSE 2002, is proposed to provide integrity and confidentiality for embedded systems. There has been no attack on BeepBeep published until now. By exploiting a weakness of the BeepBeep stream cipher during its initialization, this paper presents a key recovery attack on the BeepBeep stream cipher in the related key setting. The attack recovers the 192-bit secret key of BeepBeep with a time complexity of $2^{128}$, requiring two related keys, $2^{32}$ chosen IVs and $2^{33}$ keystream words. This is the first cryptanalytic attack on BeepBeep which is significantly better than the exhaustive key search. The result shows that the BeepBeep stream cipher is vulnerable against the related key attack and can not provide the 192-bit security.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"18 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Related Key Attack on the Word-Oriented BeepBeep Stream Cipher\",\"authors\":\"Zhiyi Liao, Lin Ding, Zheng Wu\",\"doi\":\"10.1109/CSP58884.2023.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The word-oriented BeepBeep stream cipher, developed by Driscoll in FSE 2002, is proposed to provide integrity and confidentiality for embedded systems. There has been no attack on BeepBeep published until now. By exploiting a weakness of the BeepBeep stream cipher during its initialization, this paper presents a key recovery attack on the BeepBeep stream cipher in the related key setting. The attack recovers the 192-bit secret key of BeepBeep with a time complexity of $2^{128}$, requiring two related keys, $2^{32}$ chosen IVs and $2^{33}$ keystream words. This is the first cryptanalytic attack on BeepBeep which is significantly better than the exhaustive key search. The result shows that the BeepBeep stream cipher is vulnerable against the related key attack and can not provide the 192-bit security.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"18 10\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Related Key Attack on the Word-Oriented BeepBeep Stream Cipher
The word-oriented BeepBeep stream cipher, developed by Driscoll in FSE 2002, is proposed to provide integrity and confidentiality for embedded systems. There has been no attack on BeepBeep published until now. By exploiting a weakness of the BeepBeep stream cipher during its initialization, this paper presents a key recovery attack on the BeepBeep stream cipher in the related key setting. The attack recovers the 192-bit secret key of BeepBeep with a time complexity of $2^{128}$, requiring two related keys, $2^{32}$ chosen IVs and $2^{33}$ keystream words. This is the first cryptanalytic attack on BeepBeep which is significantly better than the exhaustive key search. The result shows that the BeepBeep stream cipher is vulnerable against the related key attack and can not provide the 192-bit security.