[Resource Topic] 2009/402: AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time

Welcome to the resource topic for 2009/402

Title:
AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time

Authors: Michael Vielhaber

Abstract:

The stream cipher BIVIUM (both BIVIUM-A and BIVIUM-B), a modification of the eSTREAM finalist TRIVIUM, can be broken completely by the Algebraic IV Differential Attack, AIDA, using 2^{27.5} simulations or one minute of dual core processing. AIDA uses the subspaces of two 32-dimensional vector spaces over subsets of IV bits to recover 56 of the 80 key bits. The remaining 24 key bits are most easily determined by brute force search. We applied the Fast Reed-Muller Transform to speed up the search for linear equations in the key bits and the Wavefront Model to rule out nonlinear relations in the key bits early on.

ePrint: https://eprint.iacr.org/2009/402

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .