IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2010-03-05 15:20
On key recovery for Enocoro with weak key in related-key attack scenario
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science) IT2009-113 ISEC2009-121 WBS2009-92
Abstract (in Japanese) (See Japanese page) 
(in English) Enocoro is a hardware-oriented pseudorandom number generator (PRNG), whose structure is similar to the PRNG named PANAMA. An update function of an internal state of Enocoro has several parameters, and the four algorithms with specific parameters are called Enocoro-80, -128, -128v1.1, and -128v2. The last two algorithms Enocoro-128v1.1 and -128v2 have common parameters, but their update functions are slightly different. The update function of Enocoro-128v2 has been strengthened by
applying an XOR operation of a counter value to the update function of Enocoro-128v1.1 for preventing attacker from recovering an weak key in a related-key attack scenario. In this paper, we evaluate security of Enocoro-80, -128, -128v1.1, whose update functions do not have the XOR operation of counter value, against key recovery attack in an weak-key condition. As a result, we show that these three algorithms are insecure against the weak-key recovery when attacker can transform the original key into a specified related key with no cost. On the other hand, they seems secure when attacker can only control a difference of the original key.
Keyword (in Japanese) (See Japanese page) 
(in English) pseudorandom number generator / Enocoro / related-key attack / weak key / key recovery / / /  
Reference Info. IEICE Tech. Rep., vol. 109, no. 445, ISEC2009-121, pp. 275-280, March 2010.
Paper # ISEC2009-121 
Date of Issue 2010-02-25 (IT, ISEC, WBS) 
ISSN Print edition: ISSN 0913-5685    Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF IT2009-113 ISEC2009-121 WBS2009-92

Conference Information
Committee IT ISEC WBS  
Conference Date 2010-03-04 - 2010-03-05 
Place (in Japanese) (See Japanese page) 
Place (in English) Nagano-Engineering Campus, Shinshu University 
Topics (in Japanese) (See Japanese page) 
Topics (in English)  
Paper Information
Registration To ISEC 
Conference Code 2010-03-IT-ISEC-WBS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) On key recovery for Enocoro with weak key in related-key attack scenario 
Sub Title (in English)  
Keyword(1) pseudorandom number generator  
Keyword(2) Enocoro  
Keyword(3) related-key attack  
Keyword(4) weak key  
Keyword(5) key recovery  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Yasutaka Igarashi  
1st Author's Affiliation Tokyo University of Science (Tokyo Univ. of Science)
2nd Author's Name Kazuto Okamoto  
2nd Author's Affiliation Tokyo University of Science (Tokyo Univ. of Science)
3rd Author's Name Toshinobu Kaneko  
3rd Author's Affiliation Tokyo University of Science (Tokyo Univ. of Science)
4th Author's Name  
4th Author's Affiliation ()
5th Author's Name  
5th Author's Affiliation ()
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker Author-1 
Date Time 2010-03-05 15:20:00 
Presentation Time 25 minutes 
Registration for ISEC 
Paper # IT2009-113, ISEC2009-121, WBS2009-92 
Volume (vol) vol.109 
Number (no) no.444(IT), no.445(ISEC), no.446(WBS) 
Page pp.275-280 
#Pages
Date of Issue 2010-02-25 (IT, ISEC, WBS) 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan