Fast software-based attacks on SecurID

Scott Contini, Yiqun Lisa Yin

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)


SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurID hash function. They showed that vanishing differentials – collisions of the hash function – occur quite frequently, and that such differentials allow an attacker to recover the secret key in the token much faster than exhaustive search. Based on simulation results, they estimated that the running time of their attack would be about 248 full hash operations when using only a single 2-bit vanishing differential. In this paper, we present techniques to improve the attack. Our theoretical analysis and implementation experiments show that the running time of our improved attack is about 245 hash operations. We then investigate into the use of extra information that an attacker would typically have: multiple vanishing differentials or knowledge that other vanishing differentials do not occur in a nearby time period. When using the extra information, we believe that key recovery can always be accomplished within about 240 hash operations.
Original languageEnglish
Title of host publicationFast software encryption
Subtitle of host publication11th international workshop, FSE 2004 : revised papers
EditorsBimal Roy, Willi Meier
Place of PublicationGermany
PublisherSpringer, Springer Nature
Number of pages18
ISBN (Print)9783540221715
Publication statusPublished - 2004
EventInternational Workshop, Fast Software Encryption (11th : 2004) - Dehli, India
Duration: 5 Feb 20047 Feb 2004

Publication series

NameLecture notes in computer science
ISSN (Print)0302-9743


WorkshopInternational Workshop, Fast Software Encryption (11th : 2004)
CityDehli, India


Dive into the research topics of 'Fast software-based attacks on SecurID'. Together they form a unique fingerprint.

Cite this