Abstract
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher’s key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? Cryptology ePrint Archive, 2002/157 (2002), http://eprint.iacr.org/2002/157/
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)
eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/
De Cannière, C.: eSTREAM testing framework, http://www.ecrypt.eu.org/stream/perf/
Golic, J.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 220–233. Springer, Heidelberg (2000)
Kaiser, U.: Hermes8 : A Low-Complexity Low-Power Stream Cipher. Cryptology ePrint Archive, Report 2006/019, http://eprint.iacr.org/2006/019.pdf
Kaiser, U.: Hermes8F: A Low-Complexity Low-Power Stream Cipher. eSTREAM, the ECRYPT Stream Cipher Project, Second Phase Ciphers, http://www.ecrypt.eu.org/stream/p2ciphers/hermes8/hermes8f_p2.pdf
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Nyberg, K.: Diferentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994)
Raddum, H.: More Dual Rijndaels. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard – AES. LNCS, vol. 3373, pp. 142–147. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Babbage, S., Cid, C., Pramstaller, N., Raddum, H. (2007). An Analysis of the Hermes8 Stream Ciphers. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds) Information Security and Privacy. ACISP 2007. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73458-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-73458-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73457-4
Online ISBN: 978-3-540-73458-1
eBook Packages: Computer ScienceComputer Science (R0)