Cryptanalysis of achterbahn

  • Authors:
  • Thomas Johansson;Willi Meier;Frédéric Muller

  • Affiliations:
  • Department of Information Technology, Lund University, Lund, Sweden;FH Aargau, Windisch, Switzerland;HSBC, France

  • Venue:
  • FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the reduced and the full version with complexity of 255 and 261 steps. Extensions of our attacks are also described to break modified versions of the Achterbahn stream cipher, which were proposed following the publication of preliminary cryptanalysis results. These attacks highlight some problems in the design principle of Achterbahn, i.e., combining the outputs of several nonlinear (but small) shift registers using a nonlinear (but rather sparse) output function.