Cryptanalysis of the stream cipher ABC v2
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Solving systems of differential equations of addition
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Near optimal algorithms for solving differential equations of addition with batch queries
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Analysis of Grain's initialization algorithm
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
MASHA: low cost authentication with a new stream cipher
ISC'11 Proceedings of the 14th international conference on Information security
Duplexing the sponge: single-pass authenticated encryption and other applications
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Authenticated encryption: how reordering can impact performance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
The previous key recovery attacks against Helix obtain the key with about 288 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 235.6 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 234 chosen nonces and 237 chosen plaintext words, the key of Phelix can be recovered with about 241.5 operations.