Breaking Grain-128 with Dynamic Cube Attacks

被引:0
|
作者
Dinur, Itai [1 ]
Shamir, Adi [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-76100 Rehovot, Israel
来源
关键词
Cryptanalysis; stream ciphers; Grain-128; cube attacks; cube testers; dynamic cube attacks; IV STATISTICAL-ANALYSIS; KEY RECOVERY ATTACKS; DIFFERENTIAL CRYPTANALYSIS; STREAM CIPHERS; CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes that resist all previously known attacks. In this paper we concentrate on the well-known stream cipher Grain-128 [6], on which the best known key recovery attack [15] can recover only 2 key bits when the number of initialization rounds is decreased from 256 to 213. Our first attack runs in practical time complexity and recovers the full 128-bit key when the number of initialization rounds in Grain-128 is reduced to 207. Our second attack breaks a Grain-128 variant with 250 initialization rounds and is faster than exhaustive search by a factor of about 2(28). Finally, we present an attack on the full version of Grain-128 which can recover the full key but only when it belongs to a large subset of 2(-10) of the possible keys. This attack is faster than exhaustive search over the 2(118) possible keys by a factor of about 2(15). All of our key recovery attacks are the best known so far, and their correctness was experimentally verified rather than extrapolated from smaller variants of the cipher. This is the first time that a cube attack was shown to be effective against the full version of a well known cipher which resisted all previous attacks.
引用
收藏
页码:167 / 187
页数:21
相关论文
共 50 条
  • [21] Cube and Dynamic Cube Attacks on SIMON32/64
    Rabbaninejad, Reihaneh
    Ahmadian, Zahra
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 98 - 103
  • [22] Some Conditional Cube Testers for Grain-128a of Reduced Rounds
    Dalai, Deepak Kumar
    Pal, Santu
    Sarkar, Santanu
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (06) : 1374 - 1385
  • [23] Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128
    Miodrag J. Mihaljević
    Sugata Gangopadhyay
    Goutam Paul
    Hideki Imai
    Periodica Mathematica Hungarica, 2012, 65 : 205 - 227
  • [24] Conditional differential attacks on Grain-128a stream cipher
    Ma, Zhen
    Tian, Tian
    Qi, Wen-Feng
    IET INFORMATION SECURITY, 2017, 11 (03) : 139 - 145
  • [25] GENERIC CRYPTOGRAPHIC WEAKNESS OF k-NORMAL BOOLEAN FUNCTIONS IN CERTAIN STREAM CIPHERS AND CRYPTANALYSIS OF GRAIN-128
    Mihaljevic, Miodrag J.
    Gangopadhyay, Sugata
    Paul, Goutam
    Imai, Hideki
    PERIODICA MATHEMATICA HUNGARICA, 2012, 65 (02) : 205 - 227
  • [26] Grain-128同步流密码的选择初始向量相关性能量攻击
    杨昌盛
    于敬超
    严迎建
    计算机应用, 2014, 34 (05) : 1318 - 1321+1349
  • [27] Modeling for Three-Subset Division Property Without Unknown Subset Improved Cube Attacks Against Trivium and Grain-128AEAD
    Hao, Yonglin
    Leander, Gregor
    Meier, Willi
    Todo, Yosuke
    Wang, Qingju
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 466 - 495
  • [28] Dynamic cube attack on Grain-v1
    Rahimi, Majid
    Barmshory, Mostafa
    Mansouri, Mohammad Hadi
    Aref, Mohammad Reza
    IET INFORMATION SECURITY, 2016, 10 (04) : 165 - 172
  • [29] Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
    Sahoo, Soumya
    Patil, Raghavendra
    Mondal, Sandip Kumar
    Sarkar, Santanu
    Rebeiro, Chester
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [30] Fourteen years of cube attacks
    Cianfriglia, Marco
    Onofri, Elia
    Onofri, Silvia
    Pedicini, Marco
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2025, 36 (02) : 285 - 325