DING Lin and GUAN Jie, “Related-Key Chosen IV Attack on K2,” Chinese Journal of Electronics, vol. 20, no. 2, pp. 365-369, 2011,
Citation: DING Lin and GUAN Jie, “Related-Key Chosen IV Attack on K2,” Chinese Journal of Electronics, vol. 20, no. 2, pp. 365-369, 2011,

Related-Key Chosen IV Attack on K2

  • Received Date: 2010-01-01
  • Rev Recd Date: 2010-10-01
  • Publish Date: 2011-04-25
  • K2 is a secure and high-performance clock controlled stream cipher developed by the Information Security Laboratory of the KDDI R&D Laboratories Inc., Japan. Its initial key length is 128-bit or 256-bit. In this paper, a related-key chosen IV attack on K2 is presented. The computational complexity of our attack is 2128, requiring 297 chosens IV s, 2101 keystream words and 2100 words of memory. The result shows that when the initial key length is 256-bit, our attack needs much less computational effort than an exhaustive key search to break K2. Thus, K2 does not have 256-bit security claimed by its designers.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1066) PDF downloads(784) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return