Cryptanalysis of ORYX

  • Authors:
  • David Wagner;Leone Simpson;Ed Dawson;John Kelsey;William Millan;Bruce Schneier

  • Affiliations:
  • -;-;-;-;-;-

  • Venue:
  • SAC '98 Proceedings of the Selected Areas in Cryptography
  • Year:
  • 1998

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an attack on the ORYX stream cipher that requires only 25-27 bytes of known plaintext and has time complexity of 216. This attack directly recovers the full 96 bit internal state of ORYX, regardless of the key schedule. We also extend these techniques to show how to break ORYX even under a ciphertext-only model. As the ORYX cipher is used to encrypt the data transmissions in the North American Cellular system, these results are further evidence that many of the encryption algorithms used in second generation mobile communications offer a low level of security.