Skip to main content

On the Security of Hummingbird-2 against Side Channel Cube Attacks

  • Conference paper
Research in Cryptology (WEWoRC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7242))

Included in the following conference series:

Abstract

Hummingbird-2 is a recently proposed ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we address the security of the Hummingbird-2 cipher against side channel cube attacks under the single-bit-leakage model. To this end, we describe an efficient term-by-term quadraticity test for extracting simple quadratic equations besides linear ones, obtainable from the original cube attack proposed by Dinur and Shamir at EUROCRYPT 2009. Moreover, we accelerate the implementation of the proposed term-by-term quadraticity test by fully exploiting the power of a Graphic Processing Unit (GPU). Our experimental results show that using a single bit of the internal state during the initialization process of the Hummingbird-2 cipher we can recover the 48 out of 128 key bits of the Hummingbird-2 with a data complexity of about 218 chosen plaintexts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Latip, S.F., Reyhanitabar, M.R., Susilo, W., Seberry, J.: On the Security of NOEKEON against Side Channel Cube Attacks. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 45–55. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Abdul-Latip, S.F., Reyhanitabar, M., Susilo, W., Seberry, J.: Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations. In: The 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, pp. 296–305. ACM Press (2011)

    Google Scholar 

  3. Aumasson, J.-P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient FPGA Implementations of High-Dimensional Cube Tester on the Stream Cipher Grain-128. In: The 4th International Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2009 (2009), http://www.131002.net/data/papers/ADHMS09.pdf

  4. Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1–22. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Bard, G.V., Courtois, N.T., Nakahara Jr., J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 176–196. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Anderson, R., Biham, E., Knudsen, L.R.: Serpent: A Proposal for the Advanced Encryption Standard (1999), http://www.cl.cam.ac.uk/~rja14/Papers/serpent.pdf

  7. Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials, Cryptology ePrint Archive, Report 2008/385 (2008), http://eprint.iacr.org/2008/385

  8. Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Dinur, I., Shamir, A.: Side Channel Cube Attacks on Block Ciphers, Cryptology ePrint Archive, Report 2009/127 (2009), http://eprint.iacr.org/2009/127

  10. Dinur, I., Shamir, A.: Breaking Grain-128 with Dynamic Cube Attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167–187. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 3–18. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The Hummingbird Lightweight Authenticated Encryption Algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Knudsen, L.R.: Truncated and High Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  14. Lai, X.: Higher Order Derivatives and Differential Cryptanalysis. In: Communications and Cryptography: Two Sides of One Tapestry, pp. 227–233. Kluwer Academic Publishers (1994)

    Google Scholar 

  15. Le, T.-H., Canovas, C., Clédière, J.: An Overview of Side Channel Analysis Attacks. In: The 2008 ACM Symposium on Information, Computer and Communications Security - ASIACCS 2008, pp. 33–43. ACM Press (2008)

    Google Scholar 

  16. Saarinen, M.-J.O.: Cryptanalysis of Hummingbird-1. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 328–341. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  17. Vielhaber, M.: Breaking ONE.FIVIUM by AIDA – an Algebraic IV Differential Attack, Cryptology ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/2007/413

  18. Vielhaber, M.: AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time, Cryptology ePrint Archive, Report 2009/402 (2009), http://eprint.iacr.org/2009/402

  19. Yang, L., Wang, M., Qiao, S.: Side Channel Cube Attack on PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 379–391. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Zhao, X., Wang, T., Guo, S.: Improved Side Channel Cube Attacks on PRESENT, Cryptology ePrint Archive, Report 2011/165 (2011), http://eprint.iacr.org/2011/165

  21. Zhu, B., Yu, W., Wang, T.: A Practical Platform for Cube-Attack-Like Cryptanalyses, Cryptology ePrint Archive, Report 2010/644 (2010), http://eprint.iacr.org/2010/644

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fan, X., Gong, G. (2012). On the Security of Hummingbird-2 against Side Channel Cube Attacks. In: Armknecht, F., Lucks, S. (eds) Research in Cryptology. WEWoRC 2011. Lecture Notes in Computer Science, vol 7242. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34159-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34159-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34158-8

  • Online ISBN: 978-3-642-34159-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics