[Resource Topic] 2011/586: TweLEX: A Tweaked Version of the LEX Stream Cipher

Welcome to the resource topic for 2011/586

Title:
TweLEX: A Tweaked Version of the LEX Stream Cipher

Authors: Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay

Abstract:

\texttt{LEX} is a stream cipher proposed by Alex Biryukov. It was selected to phase 3 of the eSTREAM competition. \texttt{LEX} is based on the Advanced Encryption Standard {\texttt{AES}) block cipher and uses a methodology called {\em Leak Extraction}, proposed by Biryukov himself. However Dunkelman and Keller show that a key recovery attack exists against \texttt{LEX}. Their attack requires 2^{36.3} bytes of keystream produced by the same key and works with a time complexity of 2^{112} operations. In this work we explored \texttt{LEX} further and have shown that under the assumption of a related key model we can obtain 24 secret state bytes with a time complexity of 2^{96} and a data complexity of 2^{54.3}. Subsequently, we introduce a tweaked version of \texttt{LEX}, called \texttt{TweLEX}, which is shown to resist all known attacks against \texttt{LEX}. Though the throughput of \texttt{TweLEX} is half of \texttt{LEX}, it is still 1.25 times faster than \texttt{AES}, the underlying block cipher. This work attempts to revive the principle of {\em leak extraction} as a simple and elegant method to design stream ciphers.

ePrint: https://eprint.iacr.org/2011/586

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .