International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Two Trivial Attacks on Trivium

Authors:
Alexander Maximov
Alex Biryukov
Download:
URL: http://eprint.iacr.org/2007/021
Search ePrint
Search Google
Abstract: Trivium is a stream cipher designed in 2005 by C. De Canni\`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has been selected for a special focus in the second phase for the hardware portfolio of the project. Trivium has an internal state of size 288 bits and the key of length 80 bits. Although the design has a simple and elegant structure, no attack on it has been found yet. In this paper we study a class of Trivium-like designs. We propose a set of techniques that one can apply in cryptanalysis of such constructions. The first group of methods is for recovering the internal state and the secret key of the cipher, given a piece of a known keystream. Our attack is more than $2^{30}$ faster than the best known attack. Another group of techniques allows to gather statistics on the keystream, and to build a distinguisher. We study two designs: the original design of Trivium and a truncated version Bivium, which follows the same design principles as the original. We show that the internal state of the full Trivium can be recovered in time around $c\cdot 2^{83.5}$, and for Bivium this complexity is $c\cdot 2^{36.1}$. These are the best known results for these ciphers. Moreover, a distinguisher for Bivium with working time $2^{32}$ is presented, the correctness of which has been verified by simulations.
BibTeX
@misc{eprint-2007-13303,
  title={Two Trivial Attacks on Trivium},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / Trivium, stream ciphers},
  url={http://eprint.iacr.org/2007/021},
  note={ movax@it.lth.se 13536 received 23 Jan 2007},
  author={Alexander Maximov and Alex Biryukov},
  year=2007
}