Cryptanalysis;
Stream cipher;
Key and IV setup algorithm;
HC-256;
HC-128;
SSC2;
D O I:
10.1109/NSWCTC.2009.111
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
The key and IV setup algorithms of both HC-256 and HC-128 cipher are cryptanalyzed in this paper. Both ciphers are software-efficient stream ciphers, proposed as the candidates of ECRYPT Stream Cipher Project and selected into the final portfolio. Key-schedule is one of the most important parts of designing a security cipher. The weak key initialization process is a fatal potential weakness of a cipher. The analysis results show that the master keys K of HC-256 and HC-128 can be recovered from the states P and Q easily. Therefore, the key and IV setup algorithms is not perfect enough. Final, an enhanced algorithm is proposed base on subkey addition as block ciphers, to improve the security of stream ciphers.