Corpus ID: 14402427

Cryptanalysis of Hummingbird-2

@article{Zhang2012CryptanalysisOH,
  title={Cryptanalysis of Hummingbird-2},
  author={Kai Zhang and Lin Ding and Jie Guan},
  journal={IACR Cryptol. ePrint Arch.},
  year={2012},
  volume={2012},
  pages={207}
}
Abstract: Hummingbird is a lightweight encryption and message authentication primitive published in RISC’09 and WLC’10. In FSE’11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by 2 operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses… Expand
Related-Key Attacks Against Full Hummingbird-2
We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that have a certain type of low-weight XOR difference in their keys. WeExpand
SIT: A Lightweight Encryption Algorithm for Secure Internet of Things
TLDR
Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms. Expand
Elixir: A 128-bit Stream Cipher Protocol for Lightweight IoT Devices
Over time, the Internet of Things (loT) has turned out to be most prevalent in the field of research and its applications. However, IoT devices are resource constraints and thus, require lightweightExpand
High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller
TLDR
This work describes an optimized implementation of authenticated encryption for the MSP430X family of microcontrollers and explores the characteristics of the AES accelerator to improve the performance of the implemented modes. Expand
Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT
TLDR
A lightweight encryption algorithm named as Secure IoT (SIT) is applied to a quantized speech image for Secure IoT and shows the algorithm provides substantial security in just five encryption rounds. Expand
CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments
TLDR
CSProp is a cryptographic propagation algorithm whereby an untrusted machine sitting upstream of a lightweight device can modify an authenticated message so it can be efficiently verified and be mathematically guaranteed to be valid only if the original signature is also valid. Expand
Securing Network-on-Chip Using Incremental Cryptography
TLDR
This paper proposes a lightweight encryption scheme that is implemented on the network interface that improves the performance of encryption without compromising security using incremental cryptography, which exploits the unique NoC traffic characteristics. Expand
Cryptography in RFID Systems
TLDR
This survey covers the recent hardware implementations of symmetric as well as asymmetric ciphers in RFID systems, and defines the characteristic of a lightweight cryptosystem. Expand
Power Consumption Estimation of SHA-3 for the Internet of Things Applications
TLDR
The present work presents an implementation of the Secure Hash Algorithm—3 (SHA–3) on NS2 and undertakes power analysis of the algorithm for the Internet of Things applications. Expand
...
1
2
...

References

SHOWING 1-10 OF 19 REFERENCES
Cryptanalysis of Hummingbird-1
TLDR
A chosen-IV, chosen-message attack that can recover the full secret key with a few million chosen messages processed under two related IVs, based on a differential divide-and-conquer method with some novel techniques that are uniquely applicable to ciphers of this type. Expand
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
TLDR
The Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol are presented. Expand
On the Security of Hummingbird-2 against Side Channel Cube Attacks
TLDR
This paper addresses the security of the Hummingbird-2 cipher against side channel cube attacks under the single-bit-leakage model, and describes an efficient term-by-term quadraticity test for extracting simple Quadratic equations besides linear ones, obtainable from the original cube attack. Expand
Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol
Motivated by the design of the well-known Enigma machine, we present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preservingExpand
Related-Key Boomerang and Rectangle Attacks
TLDR
This paper combines the boomerang (and the rectangle) attack with related-key differentials to obtain a distinguisher that requires only four related- key adaptive chosen plaintexts and ciphertexts for COCONUT98. Expand
New types of cryptanalytic attacks using related keys
  • E. Biham
  • Mathematics, Computer Science
  • Journal of Cryptology
  • 2004
TLDR
It is shown that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockcips, and that DES is not vulnerable to the related keys attacks. Expand
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
TLDR
The experimental results show that after a system initialization phase Hummingbird can achieve up to 147 and 4.7 times faster throughput for a size-optimized and a speed- Optimized implementations, respectively, when compared to the state-of-the-art ultra-lightweight block cipher PRESENT on the similar platforms. Expand
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192
TLDR
This paper chooses another relation of the related keys, start attacks from the very beginning, so that the data and time complexities are improved largely, and only two related keys are needed instead of 32 in the attacks of [6]. Expand
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants
TLDR
It can be shown that if in addition the Markov cipher has K-f round function and the hypothesis of stochastic equivalence for related keys holds, then the iterated cipher is resistant to related-key differential attacks after sufficiently many rounds. Expand
Analysis of the DVB Common Scrambling Algorithm
TLDR
A practical attack on the stream cipher is presented and it is shown to be resistant against linear and algebraic cryptanalysis as well as simple slide attacks. Expand
...
1
2
...