based on RFIDs. The most common use cases are
building access control mechanisms and car immo-
bilizers. Hitag2 consists of one 48-bit LFSR and a
non-linear filtering function. The external block part
is used during the initialization phase and it is not im-
portant with respect to the considered transformation.
Applicability. In principle the same problem as in
the two previous examples takes place with Hitag2
and we could not apply the transformation.
REFERENCES
eSTREAM: the ECRYPT stream cipher project
http://www.ecrypt.eu.org/stream/.
Agren, M., Hell, M., Johansson, T., and Meier, W. (2011).
A new version of Grain-128 with authentication. In
Symmetric Key Encryption Workshop.
Armknecht, F. and Mikhalev, V. (2014). On increas-
ing the throughput of stream ciphers. In Topics in
Cryptology–CT-RSA.
Babbage, S. and Dodd, M. (2008). The mickey stream ci-
phers. In (Robshaw and Billet, 2008), pages 191–209.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize,
B., Gilbert, H., Goubin, L., Gouget, A., Granboulan,
L., Lauradoux, C., et al. (2005). Decim–a new stream
cipher for hardware applications. ECRYPT Stream Ci-
pher Project Report 2005, 4.
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Debraize,
B., Gilbert, H., Goubin, L., Gouget, A., Granboulan,
L., Lauradoux, C., et al. (2008). Decim v2. In New
Stream Cipher Designs, pages 140–151. Springer.
Canni`ere, C. D. and Preneel, B. (2008). Trivium. In (Rob-
shaw and Billet, 2008), pages 244–266.
Courtois, N. T., ONeil, S., and Quisquater, J.-J. (2009).
Practical algebraic attacks on the hitag2 stream cipher.
In Information Security, pages 167–176. Springer.
Dinur, I. and Shamir, A. (2011). Breaking grain-128 with
dynamic cube attacks. In Fast Software Encryption,
pages 167–187. Springer.
Dubrova, E. (2010). Finding matching initial states for
equivalent NLFSRs in the Fibonacci and the Galois
configurations. Information Theory, IEEE Transac-
tions on, 56(6):2961–2966.
Gammel, B., G¨ottfert, R., and Kniffler, O. (2007).
Achterbahn-128/80: Design and analysis. In ECRYPT
Network of Excellence-SASC Workshop Record, pages
152–165.
Good, T. and Benaissa, M. (2008). Hardware performance
of eSTREAM phase-III stream cipher candidates. In
Proc. of Workshop on the State of the Art of Stream
Ciphers (SACS08).
Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize,
B., and Mitchell, C. (2005). Analysis of the bit-search
generator and sequence compression techniques. In
Fast Software Encryption, pages 196–214. Springer.
Gupta, S. S., Chattopadhyay, A., Sinha, K., Maitra, S., and
Sinha, B. P. (2013). High-performance hardware im-
plementation for RC4 stream cipher. IEEE Transac-
tions on Computers, 62(4):730–743.
Hell, M., Johansson, T., Maximov, A., and Meier, W.
(2006). A stream cipher proposal: Grain-128. In
Information Theory, 2006 IEEE International Sympo-
sium on, pages 1614–1618. IEEE.
Mansouri, S. S. and Dubrova, E. (2010). An improved hard-
ware implementation of the Grain stream cipher. In
Digital System Design: Architectures, Methods and
Tools (DSD), 2010 13th Euromicro Conference on,
pages 433 –440.
Mansouri, S. S. and Dubrova, E. (2013). An improved hard-
ware implementation of the Grain-128a stream cipher.
In Kwon, T., Lee, M.-K., and Kwon, D., editors, Infor-
mation Security and Cryptology ICISC 2012, volume
7839 of Lecture Notes in Computer Science, pages
278–292. Springer Berlin Heidelberg.
Nakano, Y., Fukushima, K., Kiyomoto, S., and Miyake, Y.
(2011). Fast implementation of stream cipher K2 on
FPGA. In International Conference on Computer and
Information Engineering (ICCIE), pages 117–123.
Robshaw, M. J. B. and Billet, O., editors (2008). New
Stream Cipher Designs - The eSTREAM Finalists,
volume 4986 of Lecture Notes in Computer Science.
Springer.
Stefan, D. and Mitchell, C. (2008). On the parallelization
of the MICKEY-128 2.0 stream cipher. The State of
the Art of Stream Ciphers, SASC, pages 175–185.
Wu, H. and Preneel, B. (2006). Cryptanalysis of the stream
cipher decim. In Fast Software Encryption, pages 30–
40. Springer.
Yan, J. and Heys, H. M. (2007). Hardware implementation
of the Salsa20 and Phelix stream ciphers. In Electri-
cal and Computer Engineering, 2007. CCECE 2007.
Canadian Conference on, pages 1125–1128. IEEE.
Z. Liu, L. Zhang, J. J. and Pan, W. (2010). Efficient
pipelined stream cipher ZUC algorithm in FPGA. In
The First International Workshop on ZUC Algorithm,
December 2-3, Beijing, China,.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
386