The Key and IV Setup of the Stream Ciphers HC-256 and HC-128

被引:8
|
作者
Liu, Yunyi [1 ]
Qin, Tuanfa [1 ]
机构
[1] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Peoples R China
关键词
Cryptanalysis; Stream cipher; Key and IV setup algorithm; HC-256; HC-128; SSC2;
D O I
10.1109/NSWCTC.2009.111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key and IV setup algorithms of both HC-256 and HC-128 cipher are cryptanalyzed in this paper. Both ciphers are software-efficient stream ciphers, proposed as the candidates of ECRYPT Stream Cipher Project and selected into the final portfolio. Key-schedule is one of the most important parts of designing a security cipher. The weak key initialization process is a fatal potential weakness of a cipher. The analysis results show that the master keys K of HC-256 and HC-128 can be recovered from the states P and Q easily. Therefore, the key and IV setup algorithms is not perfect enough. Final, an enhanced algorithm is proposed base on subkey addition as block ciphers, to improve the security of stream ciphers.
引用
收藏
页码:430 / 433
页数:4
相关论文
共 24 条
  • [21] One Word/Cycle HC-128 Accelerator via State-Splitting Optimization
    Khalid, Ayesha
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Paul, Goutam
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 283 - 303
  • [22] A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment
    Kausar, Firdous
    Naureen, Ayesha
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 682 - 691
  • [23] Chosen IV statistical analysis for key recovery attacks on stream ciphers
    Fischer, Simon
    Khazaei, Shahrarn
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 236 - +
  • [24] Related Key Chosen IV Attack on Grain-128a Stream Cipher
    Ding, Lin
    Guan, Jie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 803 - 809