About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper · Book chapter

State-Recovery Analysis of Spritz

From

Graz University of Technology1

Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Cryptology, Department of Applied Mathematics and Computer Science, Technical University of Denmark3

RC4 suffered from a range of plaintext-recovery attacks using statistical biases, which use substantial, albeit close-to-practical, amounts of known keystream in applications such as TLS or WEP/WPA. Spritz was recently proposed at the rump session of CRYPTO 2014 as a slower redesign of RC4 by Rivest and Schuldt, aiming at reducing the statistical biases that lead to these attacks on RC4.

Even more devastating than those plaintext-recovery attacks from large amounts of keystream would be state- or key-recovery attacks from small amounts of known keystream. For RC4, there is unsubstantiated evidence that they may exist, the situation for Spritz is however not clear, as resistance against such attacks was not a design goal.

In this paper, we provide the first cryptanalytic results on Spritz and introduce three different state recovery algorithms. Our first algorithm recovers an internal state, requiring only a short segment of keystream, with an approximated complexity of 21400, which is much faster than exhaustive search through all possible states, but is still far away from a practical attack.

Furthermore, we introduce a second algorithm that uses a pattern in the keystream to reduce the number of guessed values in our state recovery algorithm. Our third algorithm uses a probabilistic approach by considering the permutation table as probability distribution. All in all, rather than showing a weakness, our analysis supports the conjecture that compared to RC4, Spritz may also provide higher resistance against potentially devastating state-recovery attacks.

Language: English
Publisher: Springer
Year: 2015
Pages: 204-221
Proceedings: 4th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT 2015)International Conference on Cryptology and Information Security in Latin America
Series: Lecture Notes in Computer Science
Journal subtitle: Proceedings of the 4th International Conference on Cryptology and Information Security in Latin America
ISBN: 3319221736 , 3319221744 , 9783319221731 and 9783319221748
ISSN: 03029743 and 16113349
Types: Conference paper and Book chapter
DOI: 10.1007/978-3-319-22174-8_12
ORCIDs: Kölbl, Stefan

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis