User menu

Practical algebraic attacks on the Hitag2 stream cipher

Bibliographic reference Courtois, N.T. ; Quisquater, Jean-Jacques ; O'Neil, S.. Practical algebraic attacks on the Hitag2 stream cipher.Information Security. 12th International Conference, ISC 2009 (Pisa, Italy, 7-9 September 2009). In: Samarati, P.; Ardagna, C.A.; Yung, M.; Martinelli, F.;, Information Security. 12th International Conference, ISC 2009, Springer verlag2009, p. 167-176
Permanent URL http://hdl.handle.net/2078.1/67506
  1. Armknecht Frederik, Krause Matthias, Algebraic Attacks on Combiners with Memory, Advances in Cryptology - CRYPTO 2003 (2003) ISBN:9783540406747 p.162-175, 10.1007/978-3-540-45146-4_10
  2. Indesteege Sebastiaan, Keller Nathan, Dunkelman Orr, Biham Eli, Preneel Bart, A Practical Attack on KeeLoq, Advances in Cryptology – EUROCRYPT 2008 ISBN:9783540789666 p.1-18, 10.1007/978-3-540-78967-3_1
  3. Biryukov Alex, Shamir Adi, Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Advances in Cryptology — ASIACRYPT 2000 (2000) ISBN:9783540414049 p.1-13, 10.1007/3-540-44448-3_1
  4. Buchmann Johannes, Pyshkin Andrei, Weinmann Ralf-Philipp, Block Ciphers Sensitive to Gröbner Basis Attacks, Topics in Cryptology – CT-RSA 2006 (2006) ISBN:9783540310334 p.313-331, 10.1007/11605805_20
  5. Cid C., Murphy S., Robshaw M. J. B., Small Scale Variants of the AES, Fast Software Encryption (2005) ISBN:9783540265412 p.145-162, 10.1007/11502760_10
  6. Courtois Nicolas T., The Security of Hidden Field Equations (HFE), Topics in Cryptology — CT-RSA 2001 (2001) ISBN:9783540418986 p.266-281, 10.1007/3-540-45353-9_20
  7. Courtois Nicolas T., Pieprzyk Josef, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations, Lecture Notes in Computer Science (2002) ISBN:9783540001713 p.267-287, 10.1007/3-540-36178-2_17
  8. Courtois Nicolas T., Meier Willi, Algebraic Attacks on Stream Ciphers with Linear Feedback, Lecture Notes in Computer Science (2003) ISBN:9783540140399 p.345-359, 10.1007/3-540-39200-9_21
  9. Courtois Nicolas T., Bard Gregory V., Algebraic Cryptanalysis of the Data Encryption Standard, Cryptography and Coding ISBN:9783540772712 p.152-169, 10.1007/978-3-540-77272-9_10
  10. Bard, G.V., Courtois, N.T., Jefferson, C.: Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers, http://eprint.iacr.org/2007/024/
  11. Courtois Nicolas T., Bard Gregory V., Wagner David, Algebraic and Slide Attacks on KeeLoq, Fast Software Encryption ISBN:9783540710387 p.97-115, 10.1007/978-3-540-71039-4_6
  12. Courtois, N., Bard, G.V., Bogdanov, A.: Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq. In: Tatra Mountains Mathematic Publications, post-proceedings of Tatracrypt 2007 conference (2008) (to apperar)
  13. Courtois, N., O’Neil, S.: Reverse-engineered Philips/NXP Hitag2 Cipher. Talk given at the Rump Session of Fast Sotware Encryption conference (FSE 2008), Lausanne, Switzerland, February 12 (2008), http://fse2008rump.cr.yp.to/00564f75b2f39604dc204d838da01e7a.pdf
  14. Courtois, N., Nohl, K., O’Neil, S.: Algebraic Attacks on MiFare RFID Chips, http://www.nicolascourtois.com/papers/mifare_rump_ec08.pdf
  15. Courtois, N.T.: The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime. In: SECRYPT 2009, International Conference on Security and Cryptography, Milan, Italy, July 7-10 (2009)
  16. Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical Characteristics of the DES. In: Chaum, D. (ed.) Crypto 1983, pp. 171–202. Plenum Press, New York (1984)
  17. Ars, G., Faugère, J.-C.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Gröbner Bases. INRIA research report, https://hal.ccsd.cnrs.fr/
  18. Faugère, J.-C., Perret, L.: Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages (September 2008), http://eprint.iacr.org/2008/402
  19. Faugére Jean-Charles, A new efficient algorithm for computing Gröbner bases (F4), 10.1016/s0022-4049(99)00005-5
  20. Garcia Flavio D., de Koning Gans Gerhard, Muijrers Ruben, van Rossum Peter, Verdult Roel, Schreur Ronny Wichers, Jacobs Bart, Dismantling MIFARE Classic, Computer Security - ESORICS 2008 (2008) ISBN:9783540883128 p.97-114, 10.1007/978-3-540-88313-5_7
  21. Philips Semiconductors Data Sheet, HT2 Transponder Family, Communication Protocol, Reader < = > HITAG2(R) Transponder, Product Specification, Version 2.1 (October 1997), http://www.phreaker.ru/showthread.php?p=226
  22. Hulsbosch, J.: Analyse van de zwakheden van het DES-algoritme door middel van formele codering. Master thesis, K. U. Leuven, Belgium (1982)
  23. Jakobsen Thomas, Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree, Advances in Cryptology — CRYPTO '98 (1998) ISBN:9783540648925 p.212-222, 10.1007/bfb0055730
  24. Massacci Fabio, Marraro Laura, 10.1023/a:1006326723002
  25. Meier Willi, Pasalic Enes, Carlet Claude, Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology - EUROCRYPT 2004 (2004) ISBN:9783540219354 p.474-491, 10.1007/978-3-540-24676-3_28
  26. MiniSat 2.0. An open-source SAT solver package, by Niklas Eén, Niklas Sörensson, http://www.cs.chalmers.se/Cs/Research/FormalMethods/MiniSat/
  27. Mironov Ilya, Zhang Lintao, Applications of SAT Solvers to Cryptanalysis of Hash Functions, Lecture Notes in Computer Science (2006) ISBN:9783540372066 p.102-115, 10.1007/11814948_13
  28. Murphy Sean, Robshaw Matthew J.B., Essential Algebraic Structure within the AES, Advances in Cryptology — CRYPTO 2002 (2002) ISBN:9783540440505 p.1-16, 10.1007/3-540-45708-9_1
  29. Hitag2 specification, reference implementation and test vectors, http://cryptolib.com/ciphers/hitag2/
  30. Raddum, H., Semaev, I.: New Technique for Solving Sparse Equation Systems, http://eprint.iacr.org/2006/475/
  31. Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28 (1949); see in particular page 704
  32. Schaumüller-Bichl Ingrid, Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding, Cryptography ISBN:9783540119937 p.235-255, 10.1007/3-540-39466-4_17
  33. Transponder Table, a list of cars and transponders used in these cars. Each time the table says PH/CR, which means Philips transponder in crypto mode, we assumed that this car uses Hitag2, http://www.keeloq.boom.ru/table.pdf