Analysis of Xorrotation with Application to an HC-128 Variant

نویسندگان

  • Paul Stankovski
  • Martin Hell
  • Thomas Johansson
چکیده

Many cryptographic primitives rely on word rotations (R) and xor (X) to provide proper mixing. We give RX-system mixing a very general treatment and deduce some theoretical results on related probability distributions. Pure RX-systems are easy to break, so we show how to apply our theory to a more complex system that uses RX operations in combination with S-boxes. We construct an impractical (keystream complexity 2), but new and non-trivial distinguisher for a variant of HC-128 for which modular addition is replaced with xor.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Selected Stream Ciphers

T he aim of this dissertation is to show some cryptanalytical results on a selection of stream ciphers. We have grouped theory and results into three main parts. The first part focuses on the FCSR-based constructions X-FCSR and F-FCSRH v3. For the X-FCSR family of stream ciphers we perform a severe state recovery attack. This attack works for both X-FCSR-128 and X-FCSR-256. We then develop a ge...

متن کامل

Cap analog and Potato virus A HC-Pro silencing suppressor improve GFP transient expression using an infectious virus vector in Nicotiana benthamiana

Transient expression of proteins in plants has become a choice to facilitate recombinant protein production with its fast and easy application. On the other hand, host defensive mechanisms have been reported to reduce the efficiency of transient expression in plants. Hence, this study was designed to evaluate the effect of cap analog and Potato virus A helper component proteinase (PVA HC-Pro) o...

متن کامل

A Combinatorial Analysis of HC-128

We show that the knowledge of any one of the two internal state arrays of HC-128 along with the knowledge of 2048 keystream words is sufficient to construct the other state array completely in 2 time complexity. Though our analysis does not lead to any attack on HC-128, it reveals a structural insight into the cipher. In the process, we theoretically establish certain combinatorial properties o...

متن کامل

Differential Fault Analysis of HC-128

HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a differential fault analysis attack on HC-128. The fault model in which we analyze the cipher is the one in which the attacker is able to fault a ra...

متن کامل

Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers

The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its share of exploration efforts, especially block ciphers. In this contribution we present a detailed walk-through of effective mapping of HC-128 and HC-256 stream ciphers on GPUs. Due t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012