Distinguishing attack on stream cipher HC-256'

被引:0
作者
机构
[1] Key Lab. of Computer Network and Information Security, Xidian University
来源
Li, S.-B. (shunboli@163.com) | 2012年 / Science Press卷 / 34期
关键词
Cryptanalysis; Distinguishing attack; eSTREAM; HC-256; Stream cipher;
D O I
10.3724/SP.J.1146.2011.00863
中图分类号
学科分类号
摘要
Stream cipher HC-256' is an improved algorithm of HC-256 which is proposed as a candidate to the eSTREAM project. Until now, there has not any cryptanalysis on HC-256'. In this paper, a linear distinguishing attack on HC-256' is presented. This method uses different nonlinear functions instead of state update functions to exploit the weaknesses in the even positions output bits of the keystream generation sequence. By linear approximation to the internal state bits, a distinguisher is built. The result shows that there needs about 2 281 bit keystream with advantage 0.9545 to distinguish HC-256' form random sequence. Thereby, this is a beneficial attempt to solve a problem which is given by Sekar et al in IWSEC 2009.
引用
收藏
页码:807 / 811
页数:4
相关论文
共 17 条
  • [11] Baigneres T., Junod P., Vandenay S., How far can we go beyond linear cryptanalysis, Asiacrypt 2004, 3329, pp. 432-450, (2004)
  • [12] Hell M., Johansson T., Brynielsson L., An overview of distinguishing attacks on stream ciphers, Cryptography and Communications, 1, 1, pp. 71-94, (2009)
  • [13] Crowley P., Improved cryptanalysis of Py, Workshop on the State of the Art of Stream Ciphers (SASC 2006), pp. 52-60, (2006)
  • [14] Liu Y.-Y., Qin T.-F., The key and IV setup of the stream ciphers HC-256 and HC-128, Networks Security, Wireless Communications and Trusted Computing, pp. 430-433, (2009)
  • [15] Maitra S., Paul G., Raizada S., Some observations on HC-128, Designs, Codes and Cryptography, 57, 3, pp. 1-15, (2010)
  • [16] Kircanski A., Youssef A.M., Differential fault analysis of HC-128, Africrypt 2010, 6055, pp. 261-278, (2010)
  • [17] Paul G., Maitra S., Raizada S., A combinatorial analysis of HC-128, (2010)