An analysis of the Hermes8 Stream Ciphers

被引:0
|
作者
Babbage, Steve [1 ]
Cid, Carlos [2 ]
Pramstaller, Norbert [3 ]
Raddum, Havard [4 ]
机构
[1] Vodafone Grp R&D, Newbury, Berks, England
[2] Univ London, Informat Secur Grp, Egham, Surrey, England
[3] Graz Univ Technol, IAIK, Graz, Austria
[4] Univ Bergen, Dept Informat, Bergen, Norway
关键词
Hermes8; Stream Cipher; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher's key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
引用
收藏
页码:1 / +
页数:2
相关论文
共 50 条
  • [21] Analysis and design of nonlinear combining functions in stream ciphers
    Zhang, Muxiang
    Xiao, Guozhen
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1996, 24 (01): : 48 - 52
  • [22] Integrity analysis of authenticated encryption based on stream ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 493 - 511
  • [23] A new analysis method for nonlinear component of stream ciphers
    Zhao, Y. (zhaoyb1101@yahoo.com.cn), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [24] Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers
    Beckers, Arthur
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 196 - 212
  • [25] Analysis on randomness testing of three stream ciphers and their components
    Fan, Limin
    Feng, Dengguo
    Chen, Hua
    Gaojishu Tongxin/Chinese High Technology Letters, 2007, 17 (02): : 116 - 119
  • [26] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
    Imamura, Kazuya
    Minematsu, Kazuhiko
    Iwata, Tetsu
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
  • [27] An analysis of the statistical self-synchronization of stream ciphers
    Heys, HM
    IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 897 - 904
  • [28] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Saeed Rostami
    Elham Shakour
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Cryptography and Communications, 2019, 11 : 351 - 362
  • [29] Linear attacks on stream ciphers
    Hell M.
    Johansson T.
    Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [30] Nonlinear Equivalence of Stream Ciphers
    Ronjom, Sondre
    Cid, Carlos
    FAST SOFTWARE ENCRYPTION, 2010, 6147 : 40 - +