Paper Abstract and Keywords |
Presentation |
2010-03-05 15:20
On key recovery for Enocoro with weak key in related-key attack scenario Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science) IT2009-113 ISEC2009-121 WBS2009-92 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Enocoro is a hardware-oriented pseudorandom number generator (PRNG), whose structure is similar to the PRNG named PANAMA. An update function of an internal state of Enocoro has several parameters, and the four algorithms with specific parameters are called Enocoro-80, -128, -128v1.1, and -128v2. The last two algorithms Enocoro-128v1.1 and -128v2 have common parameters, but their update functions are slightly different. The update function of Enocoro-128v2 has been strengthened by
applying an XOR operation of a counter value to the update function of Enocoro-128v1.1 for preventing attacker from recovering an weak key in a related-key attack scenario. In this paper, we evaluate security of Enocoro-80, -128, -128v1.1, whose update functions do not have the XOR operation of counter value, against key recovery attack in an weak-key condition. As a result, we show that these three algorithms are insecure against the weak-key recovery when attacker can transform the original key into a specified related key with no cost. On the other hand, they seems secure when attacker can only control a difference of the original key. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
pseudorandom number generator / Enocoro / related-key attack / weak key / key recovery / / / |
Reference Info. |
IEICE Tech. Rep., vol. 109, no. 445, ISEC2009-121, pp. 275-280, March 2010. |
Paper # |
ISEC2009-121 |
Date of Issue |
2010-02-25 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2009-113 ISEC2009-121 WBS2009-92 |
Conference Information |
Committee |
IT ISEC WBS |
Conference Date |
2010-03-04 - 2010-03-05 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Nagano-Engineering Campus, Shinshu University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2010-03-IT-ISEC-WBS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
On key recovery for Enocoro with weak key in related-key attack scenario |
Sub Title (in English) |
|
Keyword(1) |
pseudorandom number generator |
Keyword(2) |
Enocoro |
Keyword(3) |
related-key attack |
Keyword(4) |
weak key |
Keyword(5) |
key recovery |
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Yasutaka Igarashi |
1st Author's Affiliation |
Tokyo University of Science (Tokyo Univ. of Science) |
2nd Author's Name |
Kazuto Okamoto |
2nd Author's Affiliation |
Tokyo University of Science (Tokyo Univ. of Science) |
3rd Author's Name |
Toshinobu Kaneko |
3rd Author's Affiliation |
Tokyo University of Science (Tokyo Univ. of Science) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2010-03-05 15:20:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
IT2009-113, ISEC2009-121, WBS2009-92 |
Volume (vol) |
vol.109 |
Number (no) |
no.444(IT), no.445(ISEC), no.446(WBS) |
Page |
pp.275-280 |
#Pages |
6 |
Date of Issue |
2010-02-25 (IT, ISEC, WBS) |
|