The design of a stream cipher LEX
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Security notions for disk encryption
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher
New Stream Cipher Designs
Hi-index | 0.00 |
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with complexity less than exhaustive keysearch. The first attack is a distinguisher which needs keystream from only one or a few IVs to succeed. The attack is not only successful on Pomaranch Version 3 but has also less computational complexity than all previously known distinguishers for the first two versions of the cipher. The second attack is an attack which requires keystream from an amount of IVs exponential in the state size. It can be used as a distinguisher but it can also be used to predict future keystream bits corresponding to an IV if the first few bits are known. The attack will succeed on all versions of Pomaranch with complexities much lower than previously known attacks.