# Cryptanalysis of Hummingbird-2

@article{Zhang2012CryptanalysisOH, title={Cryptanalysis of Hummingbird-2}, author={Kai Zhang and Lin Ding and Jie Guan}, journal={IACR Cryptol. ePrint Arch.}, year={2012}, volume={2012}, pages={207} }

Abstract: Hummingbird is a lightweight encryption and message authentication primitive published in RISC’09 and WLC’10. In FSE’11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by 2 operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses… Expand

#### 13 Citations

Related-Key Attacks Against Full Hummingbird-2

- Computer Science
- FSE
- 2013

We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that have a certain type of low-weight XOR difference in their keys. We… Expand

SIT: A Lightweight Encryption Algorithm for Secure Internet of Things

- Computer Science, Mathematics
- ArXiv
- 2017

Simulations result shows the algorithm provides substantial security in just five encryption rounds, and the results of code size, memory utilization and encryption/decryption execution cycles are compared with benchmark encryption algo-rithms. Expand

Elixir: A 128-bit Stream Cipher Protocol for Lightweight IoT Devices

- 2020 International Conference on Cyber Warfare and Security (ICCWS)
- 2020

Over time, the Internet of Things (loT) has turned out to be most prevalent in the field of research and its applications. However, IoT devices are resource constraints and thus, require lightweight… Expand

High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller

- Computer Science
- LATINCRYPT
- 2012

This work describes an optimized implementation of authenticated encryption for the MSP430X family of microcontrollers and explores the characteristics of the AES accelerator to improve the performance of the implemented modes. Expand

Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT

- Computer Science
- 2018

A lightweight encryption algorithm named as Secure IoT (SIT) is applied to a quantized speech image for Secure IoT and shows the algorithm provides substantial security in just five encryption rounds. Expand

CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments

- Computer Science
- USENIX Security Symposium
- 2021

CSProp is a cryptographic propagation algorithm whereby an untrusted machine sitting upstream of a lightweight device can modify an authenticated message so it can be efficiently verified and be mathematically guaranteed to be valid only if the original signature is also valid. Expand

Securing Network-on-Chip Using Incremental Cryptography

- Computer Science
- 2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
- 2020

This paper proposes a lightweight encryption scheme that is implemented on the network interface that improves the performance of encryption without compromising security using incremental cryptography, which exploits the unique NoC traffic characteristics. Expand

Cryptography in RFID Systems

- Computer Science
- 2017

This survey covers the recent hardware implementations of symmetric as well as asymmetric ciphers in RFID systems, and defines the characteristic of a lightweight cryptosystem. Expand

Power Consumption Estimation of SHA-3 for the Internet of Things Applications

- Computer Science
- 2020

The present work presents an implementation of the Secure Hash Algorithm—3 (SHA–3) on NS2 and undertakes power analysis of the algorithm for the Internet of Things applications. Expand

#### References

SHOWING 1-10 OF 19 REFERENCES

Cryptanalysis of Hummingbird-1

- Computer Science
- FSE
- 2010

A chosen-IV, chosen-message attack that can recover the full secret key with a few million chosen messages processed under two related IVs, based on a differential divide-and-conquer method with some novel techniques that are uniquely applicable to ciphers of this type. Expand

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm

- Computer Science
- RFIDSec
- 2011

The Hummingbird-2 algorithm, its design and security arguments, performance analysis on both software and hardware platforms, and timing analysis in relation to the ISO 18000-6C protocol are presented. Expand

On the Security of Hummingbird-2 against Side Channel Cube Attacks

- Computer Science
- WEWoRC
- 2011

This paper addresses the security of the Hummingbird-2 cipher against side channel cube attacks under the single-bit-leakage model, and describes an efficient term-by-term quadraticity test for extracting simple Quadratic equations besides linear ones, obtainable from the original cube attack. Expand

Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol

- 2009

Motivated by the design of the well-known Enigma machine, we present a novel ultra-lightweight encryption scheme, referred to as Hummingbird, and its applications to a privacy-preserving… Expand

Related-Key Boomerang and Rectangle Attacks

- Mathematics, Computer Science
- EUROCRYPT
- 2005

This paper combines the boomerang (and the rectangle) attack with related-key differentials to obtain a distinguisher that requires only four related- key adaptive chosen plaintexts and ciphertexts for COCONUT98. Expand

New types of cryptanalytic attacks using related keys

- Mathematics, Computer Science
- Journal of Cryptology
- 2004

It is shown that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockcips, and that DES is not vulnerable to the related keys attacks. Expand

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices

- Computer Science
- Financial Cryptography Workshops
- 2010

The experimental results show that after a system initialization phase Hummingbird can achieve up to 147 and 4.7 times faster throughput for a size-optimized and a speed- Optimized implementations, respectively, when compared to the state-of-the-art ultra-lightweight block cipher PRESENT on the similar platforms. Expand

Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192

- Mathematics, Computer Science
- Selected Areas in Cryptography
- 2006

This paper chooses another relation of the related keys, start attacks from the very beginning, so that the data and time complexities are improved largely, and only two related keys are needed instead of 32 in the attacks of [6]. Expand

Related-Key Differential Cryptanalysis of 192-bit Key AES Variants

- Computer Science
- Selected Areas in Cryptography
- 2003

It can be shown that if in addition the Markov cipher has K-f round function and the hypothesis of stochastic equivalence for related keys holds, then the iterated cipher is resistant to related-key differential attacks after sufficiently many rounds. Expand

Analysis of the DVB Common Scrambling Algorithm

- Computer Science
- Communications and Multimedia Security
- 2004

A practical attack on the stream cipher is presented and it is shown to be resistant against linear and algebraic cryptanalysis as well as simple slide attacks. Expand