DocumentCode :
3608094
Title :
Practical-time related-key attack on Hummingbird-2
Author :
Zhenqing Shi ; Bin Zhang ; Dengguo Feng
Author_Institution :
Inst. of Software, Beijing, China
Volume :
9
Issue :
6
fYear :
2015
Firstpage :
321
Lastpage :
327
Abstract :
Hummingbird-2, designed by Engels et al., is a lightweight cipher with built-in MAC functionality. In this study, the authors examine the security of Hummingbird-2 in the related-key model. First, the authors define a new cryptographic notion of an S-box, called combination points, based on its differential equation, and demonstrate some properties of combination points. A potential application of the new notion is to recover some partial input of an S-box, and the authors show this on Hummingbird-2 by recovering some internal state bits. Then, by carefully studying the differential distributions of the S-boxes, a set of key dependent S-boxes can be derived and be used to recover the subkey word of Hummingbird-2. At last, by the divide and conquer strategy, all the 128 key bits can be recovered with a complexity of 240, which is much lower than that (264) of the attack at FSE 2013. The attack has been fully implemented on a PC and the secret key has been recovered in a few hours. The results provide some new insights into the design of cryptographic S-boxes.
Keywords :
cryptography; divide and conquer methods; Hummingbird-2; MAC functionality; combination points; cryptographic S-boxes; cryptographic notion; differential equation; divide and conquer strategy; internal state bits; lightweight cipher; practical-time related-key attack;
fLanguage :
English
Journal_Title :
Information Security, IET
Publisher :
iet
ISSN :
1751-8709
Type :
jour
DOI :
10.1049/iet-ifs.2014.0424
Filename :
7295683
Link To Document :
بازگشت