Back to Search Start Over

Security Analysis of Fountain V1

Authors :
Matthew Beighton
Harry Bartlett
Leonie Simpson
Source :
ACSW
Publication Year :
2020
Publisher :
ACM, 2020.

Abstract

This paper analyses the security of the lightweight cryptographic algorithm Fountain (V1), which is a candidate in the current NIST competition for such ciphers. We examine the Boolean functions used in Fountain for state update and output. We show that correlations exist between S-box functions and some register stages that may lead to correlation attacks if certain update functions are detectable. We also show that the state update function avoids state convergence in any phase of cipher operation, but state collisions may be forced in one bit position, for select states, by manipulating the associated data or plaintext.

Details

Database :
OpenAIRE
Journal :
Proceedings of the Australasian Computer Science Week Multiconference
Accession number :
edsair.doi...........ea37bc5072ebaa5887cd05b30925e0be
Full Text :
https://doi.org/10.1145/3373017.3373023