The Australian stream cipher NLSv2 [6] is a 32-bit word orientedstream cipher that was quite successful in the stream ciphers competition - theproject eSTREAM. The cipher achieved Phase 3 and successfully accomplishedone of the main requirements for candidates in Prole 1 (software oriented pro-posals) - to have a better performance than AES in counter mode. However thecipher was not chosen into the nal portfolio [1], because its performance was notso perfect when comparing with other nalist. Also there is a security issue witha high correlation in the used S-Box, which some eective distinguishers exploit.In this paper, a practical demonstration of the distinguishing attack against thesmaller version of the cipher is introduced. In our experiments, we have at disposala machine with four cores (Intel RCoreTM Quad @ 2.66 GHz) and single attacklasts about 6 days. Our results conrmed the assumption and we got 50.0473%zeros in distinguisher.
@article{192, title = {Practical demonstration of the distinguishing attack against the stream cipher NLSv2}, journal = {Tatra Mountains Mathematical Publications}, volume = {51}, year = {2012}, doi = {10.2478/tatra.v53i0.192}, language = {EN}, url = {http://dml.mathdoc.fr/item/192} }
Braško, Michal; Boor, Jaroslav. Practical demonstration of the distinguishing attack against the stream cipher NLSv2. Tatra Mountains Mathematical Publications, Tome 51 (2012) . doi : 10.2478/tatra.v53i0.192. http://gdmltest.u-ga.fr/item/192/