An algebraic cryptanalysis tool for cube attack on symmetric ciphers

被引:4
|
作者
Karmakar, Sandip [1 ]
Mishra, Prasanna [2 ]
Gaba, Navneet [2 ]
Chowdhury, Dipanwita Roy [3 ]
机构
[1] Indian Inst Informat Technol Kalyani, Webel IT Pk,Near Buddha Pk, Kalyani 741235, W Bengal, India
[2] Def Res & Dev Org, Sci Anal Grp, Metcalfe House, Delhi 110054, India
[3] Indian Inst Technol Kharagpur, Kharagpur 721302, W Bengal, India
来源
关键词
Cube Attack; Algebraic Cryptanalysis; Attack on Trivium; Cryptanalysis Tool;
D O I
10.1080/02522667.2017.1317957
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Cube attack is strong cryptanalytic technique. In literature, it is applied mainly on Trivium and Grain. However, cube attack can be applied to any symmetric cipher, stream or block if a generic tool is available. In this paper we present a parallel implementation of cube attack using openMP. The tool is tested on 8-core standard machines and 1024 node cluster. Trivium is tested using this tool and the result shows that tool successfully attacks up to 720 round of Trivium on 1024 node cluster with 42 cores used. The tool provides simple interface to incorporate any symmetric cipher and to change heuristic to generate cubes.
引用
收藏
页码:1231 / 1243
页数:13
相关论文
共 50 条
  • [1] Linear Extension Cube Attack on Stream Ciphers
    Ding, Liren
    Wang, Yongjuan
    Li, Zhufeng
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 139 - 156
  • [2] New Cryptanalysis of Block Ciphers with Low Algebraic Degree
    Sun, Bing
    Qu, Longjiang
    Li, Chao
    [J]. FAST SOFTWARE ENCRYPTION, 2009, 5665 : 180 - 192
  • [3] Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
    Roy, Dibyendu
    Datta, Pratish
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2015, 49 (1-2) : 397 - 417
  • [4] Cryptanalysis on PHOTON Hash Function using Cube Attack
    Lu, Chia-Yu
    Lin, You-Wei
    Jen, Shang-Ming
    Yang, Jar-Ferr
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND INTELLIGENT CONTROL (ISIC 2012), 2012, : 278 - 281
  • [5] Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms
    Dworak, Kamil
    Boryczka, Urszula
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT II, 2019, 11432 : 275 - 286
  • [6] Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
    Zajac, Pavol
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 43 - 56
  • [7] Cube Attack on Stream Ciphers using a Modified Linearity Test
    Srinivasan, Chungath
    Pillai, Utkarsh Umesan
    Lakshmy, K. V.
    Sethumadhavan, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 301 - 311
  • [8] Cube Attack on Trivium and A5/1 Stream Ciphers
    Islam, Saad
    Ul Hag, Inam
    [J]. 2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 409 - 415
  • [9] Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
    Pavol Zajac
    [J]. Designs, Codes and Cryptography, 2017, 82 : 43 - 56
  • [10] A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
    Datta, Pratish
    Roy, Dibyendu
    Mukhopadhyay, Sourav
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 558 - 565