DocumentCode
3608094
Title
Practical-time related-key attack on Hummingbird-2
Author
Zhenqing Shi ; Bin Zhang ; Dengguo Feng
Author_Institution
Inst. of Software, Beijing, China
Volume
9
Issue
6
fYear
2015
Firstpage
321
Lastpage
327
Abstract
Hummingbird-2, designed by Engels et al., is a lightweight cipher with built-in MAC functionality. In this study, the authors examine the security of Hummingbird-2 in the related-key model. First, the authors define a new cryptographic notion of an S-box, called combination points, based on its differential equation, and demonstrate some properties of combination points. A potential application of the new notion is to recover some partial input of an S-box, and the authors show this on Hummingbird-2 by recovering some internal state bits. Then, by carefully studying the differential distributions of the S-boxes, a set of key dependent S-boxes can be derived and be used to recover the subkey word of Hummingbird-2. At last, by the divide and conquer strategy, all the 128 key bits can be recovered with a complexity of 240, which is much lower than that (264) of the attack at FSE 2013. The attack has been fully implemented on a PC and the secret key has been recovered in a few hours. The results provide some new insights into the design of cryptographic S-boxes.
Keywords
cryptography; divide and conquer methods; Hummingbird-2; MAC functionality; combination points; cryptographic S-boxes; cryptographic notion; differential equation; divide and conquer strategy; internal state bits; lightweight cipher; practical-time related-key attack;
fLanguage
English
Journal_Title
Information Security, IET
Publisher
iet
ISSN
1751-8709
Type
jour
DOI
10.1049/iet-ifs.2014.0424
Filename
7295683
Link To Document