Advertisement

Abstract

Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchronizing mode (SS). This article presents the first attack on B mode of HBB using 128 bit secret key. This is a known-pliantext guess-then-determine attack. The main step in the attack guesses 512 bits of unknown out of the 640 bits of the initial internal state. The guesses are done sequentially and the attack uses a breadth-first-search-type algorithm so that the time complexity is 250.

Keywords

cryptanalysis known-plaintext attack HBB stream cipher 

References

  1. 1.
    Sarkar, P.: Hiji-Bij-Bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 36–51. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Joux, A., Muller, F.: Two Attacks against the HBB Stream Cipher. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 341–353. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Klima, V.: Cryptanalysis of Hiji-bij-bij (HBB). In: Cryptology ePrint Archive: Report 2005/003Google Scholar
  4. 4.
    Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Rose, G., Hawkes, P.: Turing: a fast software stream cipher. In: Rump session of Crypto (2002), http://people.qualcomm.com/ggr/QC/Turing.tgz
  6. 6.
    Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: CTRSA 2005, pp. 19–28 (2005)Google Scholar
  7. 7.
    Golic, J.: Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Information Theory 46, 1081–1090 (2000)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Golic, J., Clark, A., Dawson, E.: Generalized inversion attack on nonlinear filter generators. IEEE Trans. Computers 49, 1100–1109 (2000)CrossRefGoogle Scholar
  9. 9.
    Golic, J.: Multibit cascades may be vulnerable to inversion attack. Electronics Letters 36(18), 1536–1538 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Joydip Mitra
    • 1
  1. 1.Managemant Development InstituteHaryanaIndia

Personalised recommendations