中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 期刊论文
Title:
Practical-time related-key attack on Hummingbird-2
Author: Shi, ZQ ; Zhang, B ; Feng, DG
Keyword: divide and conquer methods ; cryptography ; practical-time related-key attack ; Hummingbird-2 ; lightweight cipher ; MAC functionality ; cryptographic notion ; combination points ; differential equation ; internal state bits ; divide and conquer strategy ; cryptographic S-boxes
Source: IET INFORMATION SECURITY
Issued Date: 2015
Volume: 9, Issue:6, Pages:321-327
Indexed Type: SCI
Department: Chinese Acad Sci, Inst Software, TCA, Beijing 100190, Peoples R China.
Abstract: Hummingbird-2, designed by Engels et al., is a lightweight cipher with built-in MAC functionality. In this study, the authors examine the security of Hummingbird-2 in the related-key model. First, the authors define a new cryptographic notion of an S-box, called combination points, based on its differential equation, and demonstrate some properties of combination points. A potential application of the new notion is to recover some partial input of an S-box, and the authors show this on Hummingbird-2 by recovering some internal state bits. Then, by carefully studying the differential distributions of the S-boxes, a set of key dependent S-boxes can be derived and be used to recover the subkey word of Hummingbird-2. At last, by the divide and conquer strategy, all the 128 key bits can be recovered with a complexity of 2(40), which is much lower than that (2(64)) of the attack at FSE 2013. The attack has been fully implemented on a PC and the secret key has been recovered in a few hours. The results provide some new insights into the design of cryptographic S-boxes.
English Abstract: Hummingbird-2, designed by Engels et al., is a lightweight cipher with built-in MAC functionality. In this study, the authors examine the security of Hummingbird-2 in the related-key model. First, the authors define a new cryptographic notion of an S-box, called combination points, based on its differential equation, and demonstrate some properties of combination points. A potential application of the new notion is to recover some partial input of an S-box, and the authors show this on Hummingbird-2 by recovering some internal state bits. Then, by carefully studying the differential distributions of the S-boxes, a set of key dependent S-boxes can be derived and be used to recover the subkey word of Hummingbird-2. At last, by the divide and conquer strategy, all the 128 key bits can be recovered with a complexity of 2(40), which is much lower than that (2(64)) of the attack at FSE 2013. The attack has been fully implemented on a PC and the secret key has been recovered in a few hours. The results provide some new insights into the design of cryptographic S-boxes.
Language: 英语
WOS ID: WOS:000362505000003
Citation statistics:
Content Type: 期刊论文
URI: http://ir.iscas.ac.cn/handle/311060/17431
Appears in Collections:软件所图书馆_期刊论文

Files in This Item:
File Name/ File Size Content Type Version Access License
07295683.pdf(319KB)----限制开放 联系获取全文

Recommended Citation:
Shi, ZQ,Zhang, B,Feng, DG. Practical-time related-key attack on Hummingbird-2[J]. IET INFORMATION SECURITY,2015-01-01,9(6):321-327.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Shi, ZQ]'s Articles
[Zhang, B]'s Articles
[Feng, DG]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Shi, ZQ]‘s Articles
[Zhang, B]‘s Articles
[Feng, DG]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace