An analysis of the Hermes8 Stream Ciphers

被引:0
|
作者
Babbage, Steve [1 ]
Cid, Carlos [2 ]
Pramstaller, Norbert [3 ]
Raddum, Havard [4 ]
机构
[1] Vodafone Grp R&D, Newbury, Berks, England
[2] Univ London, Informat Secur Grp, Egham, Surrey, England
[3] Graz Univ Technol, IAIK, Graz, Austria
[4] Univ Bergen, Dept Informat, Bergen, Norway
关键词
Hermes8; Stream Cipher; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher's key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
引用
收藏
页码:1 / +
页数:2
相关论文
共 50 条
  • [11] Performance and Statistical Analysis of Stream Ciphers in GSM Communications
    Yerukala, Nagendar
    Prasad, V. Kamakshi
    Apparao, Allam
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (01) : 11 - 18
  • [12] Integrity analysis of authenticated encryption based on stream ciphers
    Kazuya Imamura
    Kazuhiko Minematsu
    Tetsu Iwata
    International Journal of Information Security, 2018, 17 : 493 - 511
  • [13] The analysis and realization of RC4 stream ciphers
    Zhuang, Peidong
    Ding, Qun
    Wang, Lu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 4, 2009, : 448 - 452
  • [14] Comparative analysis of the structures of eSTREAM submitted stream ciphers
    Afzal, Mehreen
    Kausar, Firdous
    Masood, Ashraf
    SECOND INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2006, PROCEEDINGS, 2006, : 245 - +
  • [15] The Implementation and Analysis of Important Symmetric Ciphers on Stream Processor
    Yao, Ping
    Xu, Mu
    Liu, Gu
    Xu, Guang
    An, Hong
    Han, Wenting
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 27 - 31
  • [16] Analysis and design of modern stream ciphers - (Invited paper)
    Johansson, T
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 66 - 66
  • [17] A Statistical Analysis for High-Speed Stream Ciphers
    Harmouch, Youssef
    El Kouch, Rachid
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017, 2018, 735 : 339 - 349
  • [18] Implementation and analysis of stream ciphers based on the elliptic curves
    Deepthi, P. P.
    Nithin, V. S.
    Sathidevi, P. S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) : 300 - 314
  • [19] On power analysis attacks against hardware stream ciphers
    Silva, Rangana De
    Navaratna, Iranga
    Kumarasiri, Malitha
    Alawatugoda, Janaka
    Wen, Chuah Chai
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 21 - 35
  • [20] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Rostami, Saeed
    Shakour, Elham
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (02): : 351 - 362