Paper 2025/197
Cryptanalysis of a nonlinear filter-based stream cipher
Abstract
It is shown that the stream cipher proposed by Carlet and Sarkar in ePrint report 2025/160 is insecure. More precisely, one bit of the key can be deduced from a few keystream bytes. This property extends to an efficient key-recovery attack. For example, for the proposal with 80 bit keys, a few kilobytes of keystream material are sufficient to recover half of the key.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- cryptanalysisstream ciphertruncated differential
- Contact author(s)
-
tim beyne @ esat kuleuven be
michiel verbauwhede @ esat kuleuven be - History
- 2025-02-11: revised
- 2025-02-10: received
- See all versions
- Short URL
- https://ia.cr/2025/197
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/197, author = {Tim Beyne and Michiel Verbauwhede}, title = {Cryptanalysis of a nonlinear filter-based stream cipher}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/197}, year = {2025}, url = {https://eprint.iacr.org/2025/197} }