A heuristic approach towards variability of HC-128

Abstract In this paper we consider the problem of variability of eSTREAM cipher HC-128. By variability of a cipher, we mean the maximum number of distinct key sequences that can be generated by the cipher. We present a heuristic analysis for variability of HC-128. Our analysis indicates that the cipher possesses maximum possible variability.

[1]  Goutam Paul,et al.  A Combinatorial Analysis of HC-128 , 2010, IACR Cryptol. ePrint Arch..

[2]  Yunyi Liu,et al.  The Key and IV Setup of the Stream Ciphers HC-256 and HC-128 , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[3]  Amr M. Youssef,et al.  Differential Fault Analysis of HC-128 , 2010, AFRICACRYPT.

[4]  Martin Hell,et al.  An overview of distinguishing attacks on stream ciphers , 2009, Cryptography and Communications.

[5]  Willi Meier,et al.  Cryptographic Significance of the Carry for Ciphers Based on Integer Addition , 1990, CRYPTO.

[6]  Santanu Sarkar,et al.  Differential Fault Attack on Grain v1, ACORN v3 and Lizard , 2017, IACR Cryptol. ePrint Arch..

[7]  Hongjun Wu,et al.  The Stream Cipher HC-128 , 2008, The eSTREAM Finalists.

[8]  Martin Hell,et al.  Improved distinguishers for HC-128 , 2012, Des. Codes Cryptogr..

[9]  Hongjun Wu A New Stream Cipher HC-256 , 2004, FSE.

[10]  Mohammad Eftekhari,et al.  Cryptanalysis and improvements on some graph-based authentication schemes , 2012, ArXiv.

[11]  Subhamoy Maitra,et al.  Some observations on HC-128 , 2011, Des. Codes Cryptogr..