SLIDE 34 The online attack on the full Grain v1
Table: The target keystream equations first exploited in our attack
1 : x0 ⊕ h(l3, l25, l46, l64, n63) = z0 2 : x1 ⊕ h(l4, l26, l47, l65, n64) = z1 3 : x2 ⊕ h(l5, l27, l48, l66, n65) = z2 4 : x3 ⊕ h(l6, l28, l49, l67, n66) = z3 5 : x4 ⊕ h(l7, l29, l50, l68, n67) = z4 6 : x5 ⊕ h(l8, l30, l51, l69, n68) = z5 7 : x6 ⊕ h(l9, l31, l52, l70, n69) = z6 8 : x7 ⊕ h(l10, l32, l53, l71, n70) = z7 eqns. 9 : x8 ⊕ h(l11, l33, l54, l72, n71) = z8 10 : x9 ⊕ h(l12, l34, l55, l73, n72) = z9 11 : x10 ⊕ h(l13, l35, l56, l74, n73) = z10 12 : x11 ⊕ h(l14, l36, l57, l75, n74) = z11 13 : x12 ⊕ h(l15, l37, l58, l76, n75) = z12 14 : x13 ⊕ h(l16, l38, l59, l77, n76) = z13 15 : x14 ⊕ h(l17, l39, l60, l78, n77) = z14 16 : x15 ⊕ h(l18, l40, l61, l79, n78) = z15 17 : x16 ⊕ h(l19, l41, l62, l80, n79) = z16 18 : x17 ⊕ h(l20, l42, l63, l81, n80) = z17 19 : x18 ⊕ h(l21, l43, l64, l82, n81) = z18 20 : x19 ⊕ h(l22, l44, l65, l83, n82) = z19
Bin Zhang∗, Chao Xu∗ and Willi Meier∗∗ (∗ Chinese Academy of Sciences ∗∗FHNW,Switzerland) Fast Near Collision Attack on the Grain v1 Stream Cipher 02-05-2018 31 / 45