Abstract
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchronizing mode (SS). This article presents the first attack on B mode of HBB using 128 bit secret key. This is a known-pliantext guess-then-determine attack. The main step in the attack guesses 512 bits of unknown out of the 640 bits of the initial internal state. The guesses are done sequentially and the attack uses a breadth-first-search-type algorithm so that the time complexity is 250.
Chapter PDF
Similar content being viewed by others
References
Sarkar, P.: Hiji-Bij-Bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 36–51. Springer, Heidelberg (2003)
Joux, A., Muller, F.: Two Attacks against the HBB Stream Cipher. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 341–353. Springer, Heidelberg (2005)
Klima, V.: Cryptanalysis of Hiji-bij-bij (HBB). In: Cryptology ePrint Archive: Report 2005/003
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)
Rose, G., Hawkes, P.: Turing: a fast software stream cipher. In: Rump session of Crypto (2002), http://people.qualcomm.com/ggr/QC/Turing.tgz
Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: CTRSA 2005, pp. 19–28 (2005)
Golic, J.: Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Information Theory 46, 1081–1090 (2000)
Golic, J., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Trans. Computers 49, 1100–1109 (2000)
Golic, J.: Multibit cascades may be vulnerable to inversion attack. Electronics Letters 36(18), 1536–1538 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mitra, J. (2005). A Near-Practical Attack Against B Mode of HBB. In: Roy, B. (eds) Advances in Cryptology - ASIACRYPT 2005. ASIACRYPT 2005. Lecture Notes in Computer Science, vol 3788. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593447_22
Download citation
DOI: https://doi.org/10.1007/11593447_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30684-9
Online ISBN: 978-3-540-32267-2
eBook Packages: Computer ScienceComputer Science (R0)