Related-Key Attacks Against Full Hummingbird-2

IACR Cryptology ePrint Archive(2014)

引用 10|浏览9
暂无评分
摘要
We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that have a certain type of low-weight XOR difference in their keys. We call these highly correlated keys as they produce the same ciphertext with a significant probability. The complexity of our main chosen-IV key-recovery attack is 2(64). The first 64 bits of the key can be independently recovered with only 2(36) effort. This is the first sub-exhaustive attack on the full cipher under two related keys. Our attacks use some novel tricks and techniques which are made possible by Hummingbird-2's unique word-based structure. We have verified the correctness and complexity of our attacks by fully implementing them. We also discuss enabling factors of these attacks and describe an alternative design for the WD16 nonlinear keyed function which is resistant to attacks of this type. The new experimental function replaces S-boxes with simple. functions.
更多
查看译文
关键词
Hummingbird-2,Related-key cryptanalysis,Lightweight cryptography,Authenticated encryption,Hummingbird-2nu
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要