An improved degree evaluation method of NFSR-based cryptosystems

被引:0
|
作者
Chen-Dong Ye
Tian Tian
机构
[1] PLA Strategic Supporting Force Information Engineering University,
来源
关键词
Degree evaluation; The numeric mapping; Correlation cube attacks; Zero-sum distinguisher; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the algebraic degree evaluation of NFSR-based cryptosystems. The degree evaluation method based on the numeric mapping proposed by Liu at CRYPTO 2017 is very fast and could be applied to a cube of any size. The numeric degree of f1(x,v)×f2(x,v)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_1(\varvec{x},\varvec{v})\times f_2(\varvec{x},\varvec{v})$$\end{document} is estimated as D1+D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1+D_2$$\end{document}, where D1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1$$\end{document} and D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_2$$\end{document} are the numeric degrees of f1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_1$$\end{document} and f2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_2$$\end{document} respectively and the algebraic degree of a function is no more than its numeric degree. It can be observed that some variables may be counted twice in D1+D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1+D_2$$\end{document} and the precise of the numerical mapping heavily depends on how many variables are counted redundantly. When applied to an iterative cryptosystem, such redundances will accumulate during iteratively computing numeric degrees. This is an important factor accounting for the difference between the numeric degree and the algebraic degree of a cryptosystem. To reduce this difference, a new framework on the degree evaluation algorithm based on the numeric mapping is proposed. The main idea is to identify variables which are repeatedly counted in the numeric mapping and eliminate the redundant degrees on these variables. As illustrations, a concrete algorithm on Trivium-like ciphers is given which is shown to be useful in correlation cube attacks and the zero-sum distinguisher search. For correlation cube attacks on 835-round Trivium, we find some more useful cubes so that we could recover about 1.5 more bits at a cost of 240.7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{40.7}$$\end{document}. Furthermore, we find several cubes leading to zero-sum distinguishers for Kreyvium variants with from 875 to 880 initialization rounds.
引用
收藏
页码:2787 / 2806
页数:19
相关论文
共 50 条
  • [1] An improved degree evaluation method of NFSR-based cryptosystems
    Ye, Chen-Dong
    Tian, Tian
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (12) : 2787 - 2806
  • [2] Degree Evaluation of NFSR-Based Cryptosystems
    Liu, Meicheng
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 227 - 249
  • [3] New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
    Ding, Lin
    Wu, Zheng
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 359 - 375
  • [4] New cube distinguishers on NFSR-based stream ciphers
    Kesarwani, Abhishek
    Roy, Dibyendu
    Sarkar, Santanu
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (01) : 173 - 199
  • [5] New cube distinguishers on NFSR-based stream ciphers
    Abhishek Kesarwani
    Dibyendu Roy
    Santanu Sarkar
    Willi Meier
    Designs, Codes and Cryptography, 2020, 88 : 173 - 199
  • [6] An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round
    Dibyendu Roy
    Deepak Kumar Dalai
    Journal of Hardware and Systems Security, 2021, 5 (2) : 89 - 102
  • [7] SAT Solvers and their Limits with NFSR-based Stream Ciphers an Example with Grain v1
    Schaffhauser, Andreas
    THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019), 2019,
  • [8] Study on Security Enhancement of 64-Bit NFSR-based Block Cipher Systems with Ring Structure
    Ichiki, Toshihiro
    Tsuneda, Akio
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 842 - 844
  • [9] An Industrial Wastewater Pollution Degree Evaluation Method based on Improved Fuzzy Evaluation Theories
    Chen, Guorong
    Shi, Jinliang
    Deng, Juli
    Lei, Liang
    Xiong, Qian
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1662 - 1667
  • [10] Overhead Transmission Line Condition Evaluation Based on Improved Scatter Degree Method
    Sun, Guoqiang
    Zhu, Chao
    Ni, Ming
    Wei, Zhinong
    PROCEEDINGS OF THE 2015 CHINESE INTELLIGENT SYSTEMS CONFERENCE, VOL 1, 2016, 359 : 511 - 521