An analysis of the Hermes8 Stream Ciphers

被引:0
|
作者
Babbage, Steve [1 ]
Cid, Carlos [2 ]
Pramstaller, Norbert [3 ]
Raddum, Havard [4 ]
机构
[1] Vodafone Grp R&D, Newbury, Berks, England
[2] Univ London, Informat Secur Grp, Egham, Surrey, England
[3] Graz Univ Technol, IAIK, Graz, Austria
[4] Univ Bergen, Dept Informat, Bergen, Norway
关键词
Hermes8; Stream Cipher; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher's key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
引用
收藏
页码:1 / +
页数:2
相关论文
共 50 条
  • [31] Maximum Correlation Analysis of Nonlinear Combining Functions in Stream Ciphers
    Muxiang Zhang
    Journal of Cryptology, 2000, 13 : 301 - 314
  • [32] Observer Attack on Stream Ciphers
    Anantharaman, Ramachandran
    Sule, Virendra
    IFAC PAPERSONLINE, 2022, 55 (30): : 13 - 18
  • [33] Special Issue on Stream Ciphers
    Maitra, Subhamoy
    Sarkar, Palash
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 145 - 146
  • [34] Correlation attacks on stream ciphers
    Penzhorn, WT
    AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [35] The Research of Modern Stream Ciphers
    Gorbenko, Ivan
    Kuznetsov, Alexandr
    Lutsenko, Maria
    Ivanenko, Dmytro
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 207 - 210
  • [36] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 80 - 84
  • [37] Stream Ciphers and the eSTREAM Project
    Rijmen, Vincent
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 3 - 11
  • [38] Observability of permutations, and stream ciphers
    Byerly, RE
    Drager, LD
    Lee, JM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) : 3326 - 3330
  • [39] Cache Timing Analysis of LFSR-Based Stream Ciphers
    Leander, Gregor
    Zenner, Erik
    Hawkes, Philip
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 433 - +
  • [40] Maximum autocorrelation analysis of nonlinear combining functions in stream ciphers
    Wei, Yongzhuang
    Hu, Yupu
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 176 - +