Wip: Degree Evaluation of Grain-v1

In this paper, we initiated a degree evaluation technique for the NFSR based stream cipher like Grain family where the degree of the NFSR update bits is higher than the degree of the output function. Here, we have applied the technique on Grain-v1 to evaluate degree NFSR update bit and output bit during key scheduling phase of reduced round. We are trying to improve this technique and correctness for the full paper.

[1]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..

[2]  Willi Meier,et al.  A Key-recovery Attack on 855-round Trivium , 2018, IACR Cryptol. ePrint Arch..

[3]  Wei Zhao,et al.  New state recovery attacks on the Grain v1 stream cipher , 2016, China Communications.

[4]  Subhamoy Maitra,et al.  Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks , 2019, J. Hardw. Syst. Secur..

[5]  María Naya-Plasencia,et al.  Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems , 2010, ASIACRYPT.

[6]  T. E. Bjrstad Cryptanalysis of Grain using Time / Memory / Data Tradeos , 2008 .

[7]  Anne Canteaut,et al.  Higher-Order Differential Properties of Keccak and Luffa , 2011, FSE.

[8]  Bin Zhang,et al.  Fast Near Collision Attack on the Grain v1 Stream Cipher , 2018, IACR Cryptol. ePrint Arch..

[9]  Meicheng Liu,et al.  Degree Evaluation of NFSR-Based Cryptosystems , 2017, CRYPTO.

[10]  Tian Tian,et al.  Deterministic Cube Attacks: A New Method to Recover Superpolies in Practice , 2018, IACR Cryptol. ePrint Arch..

[11]  Hideki Imai,et al.  Internal state recovery of grain-v1 employing normality order of the filter function , 2012, IET Inf. Secur..

[12]  Anne Canteaut,et al.  On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ , 2013, IEEE Transactions on Information Theory.

[13]  Zhenqi Li,et al.  Near Collision Attack on the Grain v1 Stream Cipher , 2013, FSE.

[14]  Tian Tian,et al.  A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers , 2018, IACR Cryptol. ePrint Arch..

[15]  Anne Canteaut,et al.  Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis , 2002, EUROCRYPT.