Cryptanalysis of Hiji-bij-bij (HBB)

نویسنده

  • Vlastimil Klíma
چکیده

In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher in the “B mode” or as an asynchronous stream cipher in the “SS mode”. In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2 and 256-bit key with the complexity 2. In the case of B mode with 256-bit key, we show a known-plaintext attack recovering the whole plaintext with the complexity 2. All attacks need only a small part of the plaintext to be known.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Near-Practical Attack Against B Mode of HBB

Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchronizing mode (SS). This article presents the first attack on B mode of HBB using 128 bit secret key. This is a known-pliantext guess-then-determine attack. The main step in the attack guesses 512 bits of unknown out of t...

متن کامل

On the Efficiency of P2P Service Trading through Social Networks

We consider a set U of users connected in a social network GS = (U,F ), where the social link set F ⊂ U × U defines the friends relations between users. If user i treats j as his friend, i connects to j through a directed link 〈i, j〉 ∈ F . Suppose each user can provide some services, and also want to consume some services provided by other users. We can define a demand graph GD = (U,D), where D...

متن کامل

Parametric Stabilization Is Easy*

A polynomially parametrized family of continuous-time controllable linear systems is always stabilizable by polynomially parametrized feedback. 1. RESULTS Theorem 1. Let (Aλ,Bλ) be a pair of matrices, all whose entries are real polynomial functions of the parameter λ∈Rr. Assume that Aλ is n×n , Bλ is n×m, and that the pair (Aλ,Bλ) is controllable for each λ∈Rr. Then, there exists an m×n matrix ...

متن کامل

Insect bite hypersensitivity in Belgian warmblood horses: prevalence and risk factors Zomereczeem bij Belgische warmbloedpaarden: prevalentie en risicofactoren

Zomereczeem is een allergische reactie op specifieke antigenen in het speeksel van Culicoides-muggen of andere insecten. In deze studie werden omgevingsfactoren geïdentificeerd die geassocieerd zijn met het voorkomen van zomereczeem bij Belgische warmbloedpaarden (BWP) in Vlaanderen (België). Daarvoor werden met behulp van een enquête 3409 gegevens over zomereczeem verzameld tijdens sportwedstr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005