Reference : Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
Scientific journals : Article
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/41328
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
English
Wang, Qingju mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Hao, Honglin []
Todo, Yosuke []
Li, Chaoyun []
Takanori, Isobe []
Meier, Willi []
2019
IEEE Transactions on Computers
Institute of Electrical and Electronics Engineers
68
10
1470-1486
Yes (verified by ORBilu)
International
0018-9340
1557-9956
Los Alamitos
NY
[en] stream cipher ; cube attack ; division property
[en] At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond practical reach. However, assumptions are made to validate their attacks. In this paper, we further formulate the algebraic properties of the superpoly in one framework to facilitate cube attacks in more successful applications: we propose the “flag” technique to enhance the precision of MILP models, which enable us to identify proper non-cube IV assignments; a degree evaluation algorithm is presented to upper bound the degree of the superpoly s.t. the superpoly can be recovered without constructing its whole truth table and overall complexity of the attack can be largely reduced; we provide a divide-and-conquer strategy to Trivium-like stream ciphers namely Trivium, Kreyvium, TriviA-SC1/2 so that the large scale MILP models can be split into several small solvable ones enabling us to analyze Trivium-like primitives with more than 1000 initialization rounds; finally, we provide a term enumeration algorithm for finding the monomials of the superpoly, so that the complexity of many attacks can be further reduced. We apply our techniques to attack the initialization of several ciphers namely 839-round Trivium, 891-round Kreyvium, 1009-round TriviA-SC1, 1004-round TriviA-SC2, 184-round Grain-128a and 750-round Acorn respectively.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX
FDISC
Researchers ; Professionals ; Students
http://hdl.handle.net/10993/41328
10.1109/TC.2019.2909871
https://ieeexplore.ieee.org/document/8684273
This is an extended verison of the conference paper at CRYPTO 2018.

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
main.pdfAuthor preprint552.49 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.