Improved distinguishers for HC-128

Research output: Contribution to journalArticlepeer-review

295 Downloads (Pure)

Abstract

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC-128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a factor of almost 2^8. Our revised analysis shows that the keystream complexity of Wu’s original attack is 2^160.471 32-bit keystream blocks. We then go on to investigate two new types of distinguishers on HC-128. One of them, a distinguisher counting the number of zeros in created blocks of bits, gives a biased distribution that requires 2^143.537 such constructed block samples (2^152.537 32-bit keystream blocks). For fairness, the same metric is used to compare our attack to Wu’s, and our improvement is significant compared to Wu’s original result. Furthermore, the vector-based methodology used is general and can be applied to any cryptographic primitive that reveals a suitable probability distribution.
Original languageEnglish
Pages (from-to)225-240
JournalDesigns, Codes and Cryptography
Volume63
Issue number2
DOIs
Publication statusPublished - 2012

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Keywords

  • Stream cipher HC-128 Cryptanalysis Distinguisher

Fingerprint

Dive into the research topics of 'Improved distinguishers for HC-128'. Together they form a unique fingerprint.

Cite this