Breaking Grain-128 with Dynamic Cube Attacks

被引:0
|
作者
Dinur, Itai [1 ]
Shamir, Adi [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-76100 Rehovot, Israel
来源
关键词
Cryptanalysis; stream ciphers; Grain-128; cube attacks; cube testers; dynamic cube attacks; IV STATISTICAL-ANALYSIS; KEY RECOVERY ATTACKS; DIFFERENTIAL CRYPTANALYSIS; STREAM CIPHERS; CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes that resist all previously known attacks. In this paper we concentrate on the well-known stream cipher Grain-128 [6], on which the best known key recovery attack [15] can recover only 2 key bits when the number of initialization rounds is decreased from 256 to 213. Our first attack runs in practical time complexity and recovers the full 128-bit key when the number of initialization rounds in Grain-128 is reduced to 207. Our second attack breaks a Grain-128 variant with 250 initialization rounds and is faster than exhaustive search by a factor of about 2(28). Finally, we present an attack on the full version of Grain-128 which can recover the full key but only when it belongs to a large subset of 2(-10) of the possible keys. This attack is faster than exhaustive search over the 2(118) possible keys by a factor of about 2(15). All of our key recovery attacks are the best known so far, and their correctness was experimentally verified rather than extrapolated from smaller variants of the cipher. This is the first time that a cube attack was shown to be effective against the full version of a well known cipher which resisted all previous attacks.
引用
收藏
页码:167 / 187
页数:21
相关论文
共 50 条
  • [1] Dynamic Cube Attacks against Grain-128AEAD
    Liu, Chen
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 190 - 221
  • [2] Fault Analysis of GRAIN-128
    Berzati, Alexandre
    Canovas, Cecile
    Castagnos, Guilhem
    Debraize, Blandine
    Goubin, Louis
    Gouget, Aline
    Paillier, Pascal
    Salgado, Stephanie
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 7 - +
  • [3] Related-key chosen IV attacks on Grain-v1 and Grain-128
    Lee, Yuseop
    Jeong, Kitae
    Sung, Jaechul
    Hong, Seokhie
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 321 - +
  • [4] A stream cipher proposal: Grain-128
    Hell, Martin
    Johansson, Thomas
    Maximov, Alexander
    Meier, Willi
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1614 - +
  • [5] Grain-128a: A new version of Grain-128 with optional authentication
    Ågren M.
    Hell M.
    Johansson T.
    Meier W.
    International Journal of Wireless and Mobile Computing, 2011, 5 (01) : 48 - 59
  • [6] Research on Grain-128's cryptosystem recognition
    Zhao, Zhicheng
    Zhao, Yaqun
    Liu, Fengmei
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2013 - 2017
  • [7] Fault Analysis of Grain-128 by Targeting NFSR
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 298 - 315
  • [8] Randomness Analysis on Grain-128 Stream Cipher
    Zawawi, Norul Hidayah Lot Ahmad
    Seman, Kamaruzzaman
    Zaizi, Nurzi Juana Mohd
    INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS 2013 (ICMSS2013), 2013, 1557 : 15 - 20
  • [9] Quantum security of Grain-128/Grain-128a stream cipher against HHL algorithm
    Weijie Liu
    Juntao Gao
    Quantum Information Processing, 2021, 20
  • [10] Improved Practical Differential Fault Analysis of Grain-128
    Dey, Prakash
    Chakraborty, Abhishek
    Adhikari, Avishek
    Mukhopadhyay, Debdeep
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 459 - 464