[Resource Topic] 2016/092: Cryptanalysis of the Full Spritz Stream Cipher

Welcome to the resource topic for 2016/092

Title:
Cryptanalysis of the Full Spritz Stream Cipher

Authors: Subhadeep Banik, Takanori Isobe

Abstract:

Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on {\it a short-term bias} in the first two bytes of a keystream and {\it a long-term bias} in the first two bytes of every cycle of N keystream bytes, where N is the size of the internal permutation. Our attacks are able to distinguish a keystream of the {\it full} Spritz from a random sequence with samples of first two bytes produced by 2^{44.8} multiple key-IV pairs or 2^{60.8} keystream bytes produced by a single key-IV pair. These biases are also useful in the event of plaintext recovery in a broadcast attack. In the second part of the paper, we look at a state recovery attack on Spritz, in a special situation when the cipher enters a class of weak states. We determine the probability of encountering such a state, and demonstrate a state recovery algorithm that betters the 2^{1400} step algorithm of Ankele et al. at Latincrypt 2015.

ePrint: https://eprint.iacr.org/2016/092

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .