Conference

Authors: Rizomiliotis P.
Title: Misusing universal hash functions: security analysis of a hardware efficient stream cipher using LFSR based hash function
Conference: IEEE Information Theory Workshop
Editors:
Ed: No
Eds: No
Pages:
To appear: No
Month: January
Year: 2010
Place: Cairo, Egypt
Pubisher: IEEE Press
Link:
File name:
Abstract: Hardware efficient encryption algorithms are necessary for applications like low cost Radio Frequency Identification (RFID) tags. In order to keep the cost as low as possible, the designers of lightweight algorithms are using simplified versions of well studied components. Unfortunately, in most cases this simplification leads to weak constructions. In this paper, we investigate one such case. Recently, a low hardware complexity binary additive stream cipher was proposed in the Computers & Security journal. This stream cipher is based on a simplified version of a family of universal hash functions. The new family is called Toeplitz hash. The Toeplitz hash functions can be very efficiently implemented on hardware and for that the proposed stream cipher is suitable for low cost applications. However, we demonstrate that the security of the cipher is much weaker than it was claimed. More precisely, we introduce a known-plaintext attack that can retrieve the secret key with very low computational complexity that requires only a few known keystream bits by taking advantage of the low cost.