@misc{13588, keywords = {Cryptanalysis, Hermes8, Stream Cipher}, author = {Steve Babbage and Carlos Cid and Norbert Pramstaller and H{\r a}vard Raddum}, title = {An Analysis of the Hermes8 Stream Ciphers}, abstract = {Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In particular, we show an attack on the latest version of the cipher (Hermes8F), which requires very few known keystream bytes and recovers the cipher secret key in less than a second on a normal PC. Furthermore, we make some remarks on the cipher{\textquoteright}s key schedule and discuss some properties of ciphers with similar algebraic structure to Hermes8.}, year = {2007}, journal = {12th Australasian Conference on Information Security and Privacy, ACISP 2007}, volume = {4586}, pages = {1-10}, month = {08/2007}, publisher = {Lecture Notes in Computer Science, Springer Verlag}, issn = {0302-9743}, isbn = {978-3-540-73457-4}, url = {http://link.springer.com/chapter/10.1007/978-3-540-73458-1_1}, doi = {10.1007/978-3-540-73458-1_1}, }