The Key and IV Setup of the Stream Ciphers HC-256 and HC-128

被引:8
|
作者
Liu, Yunyi [1 ]
Qin, Tuanfa [1 ]
机构
[1] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
关键词
Cryptanalysis; Stream cipher; Key and IV setup algorithm; HC-256; HC-128; SSC2;
D O I
10.1109/NSWCTC.2009.111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key and IV setup algorithms of both HC-256 and HC-128 cipher are cryptanalyzed in this paper. Both ciphers are software-efficient stream ciphers, proposed as the candidates of ECRYPT Stream Cipher Project and selected into the final portfolio. Key-schedule is one of the most important parts of designing a security cipher. The weak key initialization process is a fatal potential weakness of a cipher. The analysis results show that the master keys K of HC-256 and HC-128 can be recovered from the states P and Q easily. Therefore, the key and IV setup algorithms is not perfect enough. Final, an enhanced algorithm is proposed base on subkey addition as block ciphers, to improve the security of stream ciphers.
引用
收藏
页码:430 / 433
页数:4
相关论文
共 24 条
  • [1] Image encryption using HC-128 and HC-256 stream ciphers
    Jolfaei, Alireza
    Vizandan, Ahmadreza
    Mirghadri, Abdolrasoul
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 19 - 42
  • [2] A new stream cipher HC-256
    Wu, HJ
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 226 - 244
  • [3] Distinguishing attack on stream cipher HC-256'
    Li, S.-B. (shunboli@163.com), 2012, Science Press (34):
  • [4] Designing stream ciphers with scalable data-widths: a case study with HC-128
    Paul, Goutam
    Chattopadhyay, Anupam
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (02) : 135 - 143
  • [5] Improved distinguishers for HC-128
    Stankovski, Paul
    Ruj, Sushmita
    Hell, Martin
    Johansson, Thomas
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 63 (02) : 225 - 240
  • [6] Improved distinguishers for HC-128
    Paul Stankovski
    Sushmita Ruj
    Martin Hell
    Thomas Johansson
    Designs, Codes and Cryptography, 2012, 63 : 225 - 240
  • [7] Some observations on HC-128
    Subhamoy Maitra
    Goutam Paul
    Shashwat Raizada
    Subhabrata Sen
    Rudradev Sengupta
    Designs, Codes and Cryptography, 2011, 59 : 231 - 245
  • [8] Some observations on HC-128
    Maitra, Subhamoy
    Paul, Goutam
    Raizada, Shashwat
    Sen, Subhabrata
    Sengupta, Rudradev
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 59 (1-3) : 231 - 245
  • [9] Improved Distinguishing Attacks on HC-256
    Sekar, Gautham
    Preneel, Bart
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 38 - 52
  • [10] A Cache Timing Analysis of HC-256
    Zenner, Erik
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 199 - 213