International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Steve Babbage

Publications

Year
Venue
Title
2006
EPRINT
Finding Characteristic Polynomials with Jump Indices
Steve Babbage Matthew Dodd
Jansen introduced a technique for building LFSRs that can be clocked a large number of times with a single simple operation. These may be useful in the construction of stream ciphers based on clock-controlled LFSRs. However, for LFSR sizes of typical interest, it appears generally hard to find such jumping LFSRs with particular desired parameters. In this note we explain a trick which we used to find the jumping LFSRs in MICKEY and MICKEY-128, and which may be useful for future applications.
2006
EPRINT
An Analysis of the Hermes8 Stream Ciphers
Hermes8 is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher's key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.
2003
FSE
2001
EPRINT
The COS Stream Ciphers are Extremely Weak
Steve Babbage
A new family of very fast stream ciphers called COS (for "crossing over system") has been proposed by Filiol and Fontaine, and seems to have been adopted for at least one commercial standard. In this note we show that the COS ciphers are very weak indeed ? it requires negligible effort to reconstruct the state of the keystream generator from a very small amount of known keystream.
2001
EPRINT
Cryptanalysis of the COS (2,128) Stream Ciphers
Steve Babbage
A new family of very fast stream ciphers called COS (for ?crossing over system?) has been proposed by Filiol and Fontaine, and seems to have been adopted for at least one commercial standard. COS(2,128) Mode I and COS(2,128) Mode II are particular members of this family for which the authors proposed a cryptanalysis challenge. The ciphers accept secret keys of 256, 192 or 128 bits. In this note we cryptanalyse both of these ciphers, using a small amount of known keystream ? with negligible effort in the case of Mode II, and with effort well below that required for a single DES key search in the case of Mode I.

Program Committees

FSE 2009
FSE 2008
FSE 2007
FSE 2006
FSE 2005