A New Chosen IV Statistical Attack on Grain-128a Cipher.

Vahid Amin Ghafari,Honggang Hu
DOI: https://doi.org/10.1109/cyberc.2017.101
2017-01-01
Abstract:Grain-128a is a well-known stream cipher which has resisted against all types of single-key attacks since its introduction in 2011. A chosen IV conditional differential attack was applied on Grain-128a with 177 initial rounds. It was a distinguishing attack. Another conditional differential attack was recovered 18 secret key expressions of Grain-128a with 169 initial rounds. We propose a new chosen IV statistical attack on Grain-128a upon d-monomial tests and cube testers. Our attack enables us to distinguish between random sequences and keystreams of Grain-128a up to 169 initial rounds with the 2^26 computational complexity. Better results can be achieved by more computational complexity. The proposed attack is applicable to all symmetric ciphers and hash functions, and it can reveal the weaknesses that are not possible to be found by d-monomial tests. The attack was practically verified.
What problem does this paper attempt to address?