2009
DOI: 10.1007/978-3-642-04474-8_14
|View full text |Cite
|
Sign up to set email alerts
|

Practical Algebraic Attacks on the Hitag2 Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 37 publications
(21 citation statements)
references
References 19 publications
0
21
0
Order By: Relevance
“…It was initially formulated as early as 1949 by Shannon [29]. Algebraic attacks, since the controversial paper of [11], have been applied to several stream ciphers [1,9,10] and is able to break some of them but it has not been successful in breaking real-life block ciphers, except Keeloq [7,21]. Compared to statistical analysis, such as linear and differential cryptanalysis, algebraic attacks require a comparatively small number of text pairs.…”
Section: Algebraic Attacks Using Sat Solversmentioning
confidence: 99%
“…It was initially formulated as early as 1949 by Shannon [29]. Algebraic attacks, since the controversial paper of [11], have been applied to several stream ciphers [1,9,10] and is able to break some of them but it has not been successful in breaking real-life block ciphers, except Keeloq [7,21]. Compared to statistical analysis, such as linear and differential cryptanalysis, algebraic attacks require a comparatively small number of text pairs.…”
Section: Algebraic Attacks Using Sat Solversmentioning
confidence: 99%
“…Their results concluded that the initial state of the cipher is recovered and the using of SAT solver is faster than the other attacks. The full key of Hitage2 stream cipher is recovered in a few hours by using MiniSat 2.0 [18]. In [19], the full 48-bit key of the MiFare Crypto 1 algorithm was recovered in 200 seconds on a PC, given 1 known IV (from one single encryption).…”
Section: Sat Solvers and Its Applications To Cryptanalysismentioning
confidence: 99%
“…Most notably the Mifare Classic, which has been thoroughly broken in the last few years [NESP08], [dKGHG08], [GdKGM + 08], [GvRVWS09], [Cou09]. Other prominent examples include KeeLoq [Bog07], [KKMP09], Megamos [VGE13] and Hitag2 [COQ09], [SNC09], [vN11], [SHXZ11], [VGB12] used in car keys, CryptoRF [GvRVWS10], [BKZ11], [BGV + 12] used in access control and payment systems and the A5/1 [Gol97], DECT [LST + 09] and GMR [DHW + 12] ciphers used in cordless/GSM phones. HID proposes iClass as a migration option for systems using Mifare Classic, boosting that iClass provides "improved security, performance and data integrity" 1 .…”
Section: Research Context and Related Workmentioning
confidence: 99%