Paper 2005/003

Cryptanalysis of Hiji-bij-bij (HBB)

Vlastimil Klima

Abstract

In this paper, we show several known-plaintext attacks on the stream cipher HBB which was proposed recently at INDOCRYPT 2003. The cipher can operate either as a classical stream cipher (in the B mode) or as an asynchronous stream cipher (in the SS mode). In the case of the SS mode, we present known-plaintext attacks recovering 128-bit key with the complexity 2^66 and 256-bit key with the complexity 2^67. In the case of B mode with 256-bit key, we show a known-plaintext attack recovering the whole plaintext with the complexity 2^140. All attacks need only a small part of the plaintext to be known.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
cryptanalysisHiji-bij-bijHBBstream cipherssynchronous cipherasynchronous cipherequivalent keysknown-plaintext attack
Contact author(s)
v klima @ volny cz
History
2005-01-08: received
Short URL
https://ia.cr/2005/003
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/003,
      author = {Vlastimil Klima},
      title = {Cryptanalysis of Hiji-bij-bij (HBB)},
      howpublished = {Cryptology ePrint Archive, Paper 2005/003},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/003}},
      url = {https://eprint.iacr.org/2005/003}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.