Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology - ASIACRYPT 2008
  3. Conference paper

Breaking the F-FCSR-H Stream Cipher in Real Time

  • Conference paper
  • pp 557–569
  • Cite this conference paper
Advances in Cryptology - ASIACRYPT 2008 (ASIACRYPT 2008)
Breaking the F-FCSR-H Stream Cipher in Real Time
  • Martin Hell2 &
  • Thomas Johansson2 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5350))

Included in the following conference series:

  • International Conference on the Theory and Application of Cryptology and Information Security
  • 2485 Accesses

  • 31 Citations

  • 3 Altmetric

Abstract

The F-FCSR stream cipher family has been presented a few years ago. Apart from some flaws in the initial propositions, corrected in a later stage, there are no known weaknesses of the core of these algorithms. The hardware oriented version, called FCSR-H, is one of the ciphers selected for the eSTREAM portfolio.

In this paper we present a new and severe cryptanalytic attack on the F-FCSR stream cipher family. We give the details of the attack when applied on F-FCSR-H. The attack requires a few Mbytes of received sequence and the complexity is low enough to allow the attack to be performed on a single PC within seconds.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Fast construction of binary ring FCSRs for hardware stream ciphers

Article 25 May 2017

Fast Correlation Attack Revisited

Chapter © 2018

Transistor: a TFHE-Friendly Stream Cipher

Chapter © 2025

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Computer Crime
  • Cryptology
  • Cybercrime
  • DNA computing and cryptography
  • Interspersed repetitive sequences
  • Register-Transfer-Level Implementation

References

  1. Arnault, F., Berger, T.: F-FCSR: Design of a new class of stream ciphers. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 83–97. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Arnault, F., Berger, T., Lauradoux, C.: Update on F-FCSR stream cipher. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/025 (2006), http://www.ecrypt.eu.org/stream

  3. Arnault, F., Berger, T., Minier, M.: Some results on FCSR automata with applications to the security of FCSR-based pseudorandom generators. IEEE-IT 54(2), 836–840 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  4. Jaulmes, E., Muller, F.: Cryptanalysis of ECRYPT candidates F-FCSR-8 and F-FCSR-H. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/046 (2005), http://www.ecrypt.eu.org/stream

  5. Jaulmes, E., Muller, F.: Cryptanalysis of the F-FCSR stream cipher family. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 36–50. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Klapper, A., Goresky, M.: 2-adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 174–178. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  7. Fischer, S., Meier, W., Stegemann, D.: Equivalent representations of the F-FCSR Keystream Generator. In: SASC 2008, Workshop Record, pp. 87–96 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Dept. of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00, Lund, Sweden

    Martin Hell & Thomas Johansson

Authors
  1. Martin Hell
    View author publications

    Search author on:PubMed Google Scholar

  2. Thomas Johansson
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computing, Macquarie University, NSW 2109, Sydney, Australia

    Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hell, M., Johansson, T. (2008). Breaking the F-FCSR-H Stream Cipher in Real Time. In: Pieprzyk, J. (eds) Advances in Cryptology - ASIACRYPT 2008. ASIACRYPT 2008. Lecture Notes in Computer Science, vol 5350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89255-7_34

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-89255-7_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89254-0

  • Online ISBN: 978-3-540-89255-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

173.236.255.191

Not affiliated

Springer Nature

© 2025 Springer Nature