An improved degree evaluation method of NFSR-based cryptosystems

被引:0
|
作者
Chen-Dong Ye
Tian Tian
机构
[1] PLA Strategic Supporting Force Information Engineering University,
来源
关键词
Degree evaluation; The numeric mapping; Correlation cube attacks; Zero-sum distinguisher; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the algebraic degree evaluation of NFSR-based cryptosystems. The degree evaluation method based on the numeric mapping proposed by Liu at CRYPTO 2017 is very fast and could be applied to a cube of any size. The numeric degree of f1(x,v)×f2(x,v)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_1(\varvec{x},\varvec{v})\times f_2(\varvec{x},\varvec{v})$$\end{document} is estimated as D1+D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1+D_2$$\end{document}, where D1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1$$\end{document} and D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_2$$\end{document} are the numeric degrees of f1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_1$$\end{document} and f2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$f_2$$\end{document} respectively and the algebraic degree of a function is no more than its numeric degree. It can be observed that some variables may be counted twice in D1+D2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$D_1+D_2$$\end{document} and the precise of the numerical mapping heavily depends on how many variables are counted redundantly. When applied to an iterative cryptosystem, such redundances will accumulate during iteratively computing numeric degrees. This is an important factor accounting for the difference between the numeric degree and the algebraic degree of a cryptosystem. To reduce this difference, a new framework on the degree evaluation algorithm based on the numeric mapping is proposed. The main idea is to identify variables which are repeatedly counted in the numeric mapping and eliminate the redundant degrees on these variables. As illustrations, a concrete algorithm on Trivium-like ciphers is given which is shown to be useful in correlation cube attacks and the zero-sum distinguisher search. For correlation cube attacks on 835-round Trivium, we find some more useful cubes so that we could recover about 1.5 more bits at a cost of 240.7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{40.7}$$\end{document}. Furthermore, we find several cubes leading to zero-sum distinguishers for Kreyvium variants with from 875 to 880 initialization rounds.
引用
收藏
页码:2787 / 2806
页数:19
相关论文
共 50 条
  • [31] Study on Reliability Evaluation Method Based on Improved Monte Carlo Method
    Liu Jun
    Yang Fan
    Ren Lijia
    2018 3RD INTERNATIONAL CONFERENCE ON POWER AND RENEWABLE ENERGY (ICPRE), 2018, 64
  • [32] A learning-based method of attack on optical asymmetric cryptosystems
    He, Wenqi
    Pan, Shuixin
    Liao, Meihua
    Lu, Dajiang
    Xing, Qi
    Peng, Xiang
    OPTICS AND LASERS IN ENGINEERING, 2021, 138
  • [33] An Efficient Method of Generating Parameters for Pairing-Based Cryptosystems
    Wang Maocai
    Dai Guangming
    Pen Lei
    Zhen Chang
    Qin Ruijie
    CHINA COMMUNICATIONS, 2010, 7 (04) : 167 - 171
  • [34] AN IMPROVED METHOD FOR MEASURING STOCKIGT SIZING DEGREE
    PAN, YL
    USUDA, M
    KADOYA, T
    MOKUZAI GAKKAISHI, 1986, 32 (11): : 936 - 939
  • [35] Research on the method of landscape configuration of garden plants based on the evaluation method of beauty degree
    Liu, Xuan
    Wang, Qi
    He, Bing
    Dai, Qifan
    Feng, Chen
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL TECHNOLOGY AND MANAGEMENT, 2022, 25 (1-2) : 1 - 21
  • [36] IMPROVED METHOD FOR DETERMINING DEGREE OF ABRASION OF BARLEY
    BROWN, CR
    JOURNAL OF THE INSTITUTE OF BREWING, 1974, 80 (04) : 381 - 382
  • [37] Improved Information Set Decoding for Code-Based Cryptosystems with Constrained Memory
    Wang, Maoning
    Liu, Mingjie
    FRONTIERS IN ALGORITHMICS (FAW 2015), 2015, 9130 : 241 - 258
  • [38] Trust degree evaluation method of composite service based on fuzzy logic
    Wang, Yong
    Dai, Gui-Ping
    Hou, Ya-Rong
    Ren, Xing-Tian
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (12): : 1711 - 1716
  • [39] Sensor health degree evaluation method based on fuzzy set theory
    Cao, Zheng-Hong
    Shen, Ji-Hong
    Dianji yu Kongzhi Xuebao/Electric Machines and Control, 2010, 14 (05): : 79 - 83
  • [40] The Method of Equipment Maintenance Accessibility Evaluation Based on Index Correlation Degree
    Xu Da
    Wang Bao-qi
    Li Chuang
    Wu Xi
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 500 - 503