Skip to main content

An Analysis of the Hermes8 Stream Ciphers

  • Conference paper
Information Security and Privacy (ACISP 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4586))

Included in the following conference series:

  • 1500 Accesses

Abstract

Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher’s key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? Cryptology ePrint Archive, 2002/157 (2002), http://eprint.iacr.org/2002/157/

  2. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  3. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/

  4. De Cannière, C.: eSTREAM testing framework, http://www.ecrypt.eu.org/stream/perf/

  5. Golic, J.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 220–233. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Kaiser, U.: Hermes8 : A Low-Complexity Low-Power Stream Cipher. Cryptology ePrint Archive, Report 2006/019, http://eprint.iacr.org/2006/019.pdf

  7. Kaiser, U.: Hermes8F: A Low-Complexity Low-Power Stream Cipher. eSTREAM, the ECRYPT Stream Cipher Project, Second Phase Ciphers, http://www.ecrypt.eu.org/stream/p2ciphers/hermes8/hermes8f_p2.pdf

  8. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  9. Nyberg, K.: Diferentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994)

    Google Scholar 

  10. Raddum, H.: More Dual Rijndaels. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard – AES. LNCS, vol. 3373, pp. 142–147. Springer, Heidelberg (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Hossein Ghodosi Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Babbage, S., Cid, C., Pramstaller, N., Raddum, H. (2007). An Analysis of the Hermes8 Stream Ciphers. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds) Information Security and Privacy. ACISP 2007. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73458-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73458-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73457-4

  • Online ISBN: 978-3-540-73458-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics