Advertisement

Attacks on the HKM / HFX cryptosystem

  • Xuejia Lai
  • Rainer A. Rueppel
Block Ciphers — Analysis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1039)

Abstract

The HKM / HFX cryptosystem is proposed for standardization at the ITU Telecommunication Standardization Sector Study Group 8. It is designed to provide authenticity and confidentiality of FAX messages at a commercial level of security. In addition, the HKM / HFX cryptosystem is designed for unrestricted export.

This paper contains the results of an analysis of the HKM / HFX cryptosystem. Eleven attacks and their complexities are described in full detail. The analytic results show that the security provided by the HKM / HFX cryptosystem is not high enough to meet the requirements for an international standard of the ITU, even with the additional feature of free exportability.

Keywords

Stream Cipher Modular Multiplication Linear Feedback Shift Register Modulo Operation Identity String 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [1]
    “Security requirements for group s facsimile”, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Contribution 59, Source: United Kingdom, April 1994.Google Scholar
  2. [2]
    “Proposed security system for group s facsimile”, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Contribution 60, Source: United Kingdom, April 1994.Google Scholar
  3. [3]
    “Details of the HKM algorithm and examples of its use”, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Delayed Contribution 152, Source: United Kingdom, June 1994.Google Scholar
  4. [4]
    “Proposed security system for group s facsimile, The HFX40 algorithm”, International Telecommunication Union, Telecommunication Standardization Sector, Study Group 8, Delayed Contribution, June 1994.Google Scholar
  5. [5]
    A. Rueppel, ‘Analysis and Design of Stream Ciphers', New York, NY, Springer-Verlag, 1986.Google Scholar
  6. [6]
    R. Merkle and M. Hellman, ‘On the security of multiple encryption', Communications of ACM, 24(7):465–467, 1981.Google Scholar
  7. [7]
    K. Nishimura and M. Sibuya, ‘Probability to meet in the middle', J. Cryptology, Vol. 2, Nr. 1, 1990, pp. 13–22.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Xuejia Lai
    • 1
  • Rainer A. Rueppel
    • 1
  1. 1.R3 security engineering agAathalSwitzerland

Personalised recommendations