Analysis of Xorrotation with Application to an HC-128 Variant
نویسندگان
چکیده
Many cryptographic primitives rely on word rotations (R) and xor (X) to provide proper mixing. We give RX-system mixing a very general treatment and deduce some theoretical results on related probability distributions. Pure RX-systems are easy to break, so we show how to apply our theory to a more complex system that uses RX operations in combination with S-boxes. We construct an impractical (keystream complexity 2), but new and non-trivial distinguisher for a variant of HC-128 for which modular addition is replaced with xor.
منابع مشابه
Cryptanalysis of Selected Stream Ciphers
T he aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSRH v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. This attack works for both X-FCSR-128 and X-FCSR-256. We then develop a ge...
متن کاملCap analog and Potato virus A HC-Pro silencing suppressor improve GFP transient expression using an infectious virus vector in Nicotiana benthamiana
Transient expression of proteins in plants has become a choice to facilitate recombinant protein production with its fast and easy application. On the other hand, host defensive mechanisms have been reported to reduce the efficiency of transient expression in plants. Hence, this study was designed to evaluate the effect of cap analog and Potato virus A helper component proteinase (PVA HC-Pro) o...
متن کاملA Combinatorial Analysis of HC-128
We show that the knowledge of any one of the two internal state arrays of HC-128 along with the knowledge of 2048 keystream words is sufficient to construct the other state array completely in 2 time complexity. Though our analysis does not lead to any attack on HC-128, it reveals a structural insight into the cipher. In the process, we theoretically establish certain combinatorial properties o...
متن کاملDifferential Fault Analysis of HC-128
HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a differential fault analysis attack on HC-128. The fault model in which we analyze the cipher is the one in which the attacker is able to fault a ra...
متن کاملOptimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its share of exploration efforts, especially block ciphers. In this contribution we present a detailed walk-through of effective mapping of HC-128 and HC-256 stream ciphers on GPUs. Due t...
متن کامل