Analysis of xorrotation with application to an HC-128 variant

  • Authors:
  • Paul Stankovski;Martin Hell;Thomas Johansson

  • Affiliations:
  • Dept. of Electrical and Information Technology, Lund University, Lund, Sweden;Dept. of Electrical and Information Technology, Lund University, Lund, Sweden;Dept. of Electrical and Information Technology, Lund University, Lund, Sweden

  • Venue:
  • ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many cryptographic primitives rely on word rotations (R) and xor (X) to provide proper mixing. We give RX-system mixing a very general treatment and deduce some theoretical results on related probability distributions. Pure RX-systems are easy to break, so we show how to apply our theory to a more complex system that uses RX operations in combination with S-boxes. We construct an impractical (keystream complexity 290.9), but new and non-trivial distinguisher for a variant of HC-128 for which modular addition is replaced with xor.