Distinguishing attack on stream cipher HC-256'

被引:0
作者
机构
[1] Key Lab. of Computer Network and Information Security, Xidian University
来源
Li, S.-B. (shunboli@163.com) | 2012年 / Science Press卷 / 34期
关键词
Cryptanalysis; Distinguishing attack; eSTREAM; HC-256; Stream cipher;
D O I
10.3724/SP.J.1146.2011.00863
中图分类号
学科分类号
摘要
Stream cipher HC-256' is an improved algorithm of HC-256 which is proposed as a candidate to the eSTREAM project. Until now, there has not any cryptanalysis on HC-256'. In this paper, a linear distinguishing attack on HC-256' is presented. This method uses different nonlinear functions instead of state update functions to exploit the weaknesses in the even positions output bits of the keystream generation sequence. By linear approximation to the internal state bits, a distinguisher is built. The result shows that there needs about 2 281 bit keystream with advantage 0.9545 to distinguish HC-256' form random sequence. Thereby, this is a beneficial attempt to solve a problem which is given by Sekar et al in IWSEC 2009.
引用
收藏
页码:807 / 811
页数:4
相关论文
共 17 条
  • [1] eSTREAM - The ecrypt stream cipher project, (2005)
  • [2] Wu H.-J., A new stream cipher HC-256, FSE 2004, 3017, pp. 524-538, (2004)
  • [3] Wu H.-J., The stream cipher HC-128, 4986, pp. 39-47, (2008)
  • [4] Sekar G., Preneel B., Improved distinguishing attacks on HC-256, IWSEC 2009, 5824, pp. 38-52, (2009)
  • [5] Coppersmith D., Halevi S., Jutla C., Cryptanalysis of stream ciphers with linear masking, CRYPTO 2002, 2442, pp. 515-532, (2002)
  • [6] Ahmadian Z., Mohajeri J., Salmasizadeh M., Et al., A practical distinguisher for the Shannon cipher, The Journal of Systems and Software, 83, 4, pp. 543-547, (2010)
  • [7] Chang Y.-Q., Jin C.-H., Linear distinguishing attack on Shannon algorithm, Journal of Electronics & Information Technology, 33, 1, pp. 190-193, (2011)
  • [8] Keller N., Miller S.D., Distinguishing attack on stream ciphers based on arrays of pseudo-random words, Information Processing Letters, 110, 4, pp. 129-132, (2010)
  • [9] Maitra S., Paul G., Gupta S., Attack on broadcast RC4 revisited, FSE 2011, 6733, pp. 199-217, (2011)
  • [10] Sepehrdad P., Vaudenay S., Vuagnoux M., Statistical attack on RC4 distinguishing WPA, EUROCRYPT 2011, 6632, pp. 343-363, (2011)