Advanced Search
Volume 34 Issue 4
May  2012
Turn off MathJax
Article Contents
Li Shun-Bo, Hu Yu-Pu, Wang Yan. Distinguishing Attack on Stream Cipher HC-256[J]. Journal of Electronics & Information Technology, 2012, 34(4): 807-811. doi: 10.3724/SP.J.1146.2011.00863
Citation: Li Shun-Bo, Hu Yu-Pu, Wang Yan. Distinguishing Attack on Stream Cipher HC-256[J]. Journal of Electronics & Information Technology, 2012, 34(4): 807-811. doi: 10.3724/SP.J.1146.2011.00863

Distinguishing Attack on Stream Cipher HC-256

doi: 10.3724/SP.J.1146.2011.00863
  • Received Date: 2011-08-19
  • Rev Recd Date: 2011-11-25
  • Publish Date: 2012-04-19
  • Stream cipher HC-256' is an improved algorithm of HC-256 which is proposed as a candidate to the eSTREAM project. Until now, there has not any cryptanalysis on HC-256'. In this paper, a linear distinguishing attack on HC-256' is presented. This method uses different nonlinear functions instead of state update functions to exploit the weaknesses in the even positions output bits of the keystream generation sequence. By linear approximation to the internal state bits, a distinguisher is built. The result shows that there needs about2281 bit keystream with advantage 0.9545 to distinguish HC-256' form random sequence. Thereby, this is a beneficial attempt to solve a problem which is given by Sekar et al in IWSEC 2009.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2672) PDF downloads(902) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return