New Key Recovery Attack on the MICKEY Family of Stream Ciphers

Lin Ding,Dawu Gu,Lei Wang
DOI: https://doi.org/10.1007/978-981-15-0818-9_16
2019-01-01
Abstract:The well-known MICKEY 2.0 stream cipher, designed by Babbage and Dodd in 2006, is one of the seven finalists of the eSTREAM project. In this paper, new key recovery attack on the MICKEY family of stream ciphers in the single key setting is proposed. We prove that for a given variant of the MICKEY family of stream ciphers with a key size of n(>= 80) bits and a IV size of m bits, 0 < m < n, there certainly exists a key recovery attack in the single key setting, whose online time, memory, data and offline time complexities are all smaller than 2n. Take MICKEY 2.0 with a 64-bit IV as an example. The new attack recovers all 80 key bits with an online time complexity of 278, an offline time complexity of 279 and a memory complexity of 245, requiring only 80 keystream bits. To the best of our knowledge, this paper presents the first cryptanalytic result of the MICKEY family of stream ciphers better than exhaustive key search.
What problem does this paper attempt to address?