Breaking Grain-128 with Dynamic Cube Attacks

被引:0
|
作者
Dinur, Itai [1 ]
Shamir, Adi [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-76100 Rehovot, Israel
来源
关键词
Cryptanalysis; stream ciphers; Grain-128; cube attacks; cube testers; dynamic cube attacks; IV STATISTICAL-ANALYSIS; KEY RECOVERY ATTACKS; DIFFERENTIAL CRYPTANALYSIS; STREAM CIPHERS; CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes that resist all previously known attacks. In this paper we concentrate on the well-known stream cipher Grain-128 [6], on which the best known key recovery attack [15] can recover only 2 key bits when the number of initialization rounds is decreased from 256 to 213. Our first attack runs in practical time complexity and recovers the full 128-bit key when the number of initialization rounds in Grain-128 is reduced to 207. Our second attack breaks a Grain-128 variant with 250 initialization rounds and is faster than exhaustive search by a factor of about 2(28). Finally, we present an attack on the full version of Grain-128 which can recover the full key but only when it belongs to a large subset of 2(-10) of the possible keys. This attack is faster than exhaustive search over the 2(118) possible keys by a factor of about 2(15). All of our key recovery attacks are the best known so far, and their correctness was experimentally verified rather than extrapolated from smaller variants of the cipher. This is the first time that a cube attack was shown to be effective against the full version of a well known cipher which resisted all previous attacks.
引用
收藏
页码:167 / 187
页数:21
相关论文
共 50 条
  • [31] Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
    Salam, Iftekhar
    Ooi, Thian Hooi
    Xue, Luxin
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C. -W.
    IEEE ACCESS, 2021, 9 : 72568 - 72586
  • [32] Cube Attacks on Tweakable Black Box Polynomials
    Dinur, Itai
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 278 - 299
  • [33] Cube attacks on round-reduced TinyJAMBU
    Teng, Wil Liam
    Salam, Iftekhar
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C-W
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [34] Utilizing Probabilistic Linear Equations in Cube Attacks
    Yao, Yuan
    Zhang, Bin
    Wu, Wen-Ling
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2016, 31 (02) : 317 - 325
  • [35] Cube attacks on round-reduced TinyJAMBU
    Wil Liam Teng
    Iftekhar Salam
    Wei-Chuen Yau
    Josef Pieprzyk
    Raphaël C.-W. Phan
    Scientific Reports, 12
  • [36] Utilizing Probabilistic Linear Equations in Cube Attacks
    Yuan Yao
    Bin Zhang
    Wen-Ling Wu
    Journal of Computer Science and Technology, 2016, 31 : 317 - 325
  • [37] Algebraic method to recover superpolies in cube attacks
    Ye, Chen-Dong
    Tian, Tian
    IET INFORMATION SECURITY, 2020, 14 (04) : 430 - 441
  • [38] The dynamic data cube
    Geffner, S
    Agrawal, D
    El Abbadi, A
    ADVANCES IN DATABASE TECHNOLOGY-DEBT 2000, PROCEEDINGS, 2000, 1777 : 237 - 253
  • [39] On the Security of NOEKEON against Side Channel Cube Attacks
    Abdul-Latip, Shekh Faisal
    Reyhanitabar, Mohammad Reza
    Susilo, Willy
    Seberry, Jennifer
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 45 - 55
  • [40] Cube attacks on round-reduced MORUS and Gimli
    Siwei Chen
    Zejun Xiang
    Xiangyong Zeng
    Shasha Zhang
    Science China Information Sciences, 2022, 65