C (2nd ed.): the complete reference
C (2nd ed.): the complete reference
Cryptoanalysis of the Cellular Encryption Algorithm
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
The automated cryptanalysis of analog speech scramblers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A new stream cipher using two nonlinear functions
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Hi-index | 0.00 |
We present an attack on the ORYX stream cipher that requires only 25-27 bytes of known plaintext and has time complexity of 216. This attack directly recovers the full 96 bit internal state of ORYX, regardless of the key schedule. We also extend these techniques to show how to break ORYX even under a ciphertext-only model. As the ORYX cipher is used to encrypt the data transmissions in the North American Cellular system, these results are further evidence that many of the encryption algorithms used in second generation mobile communications offer a low level of security.