Applying cube attacks to stream ciphers in realistic scenarios

被引:3
|
作者
Itai Dinur
Adi Shamir
机构
[1] The Weizmann Institute,Computer Science Department
来源
关键词
Cryptanalysis; Algebraic attacks; Cube attacks; Robust cube attacks; Stream ciphers;
D O I
暂无
中图分类号
学科分类号
摘要
Cube attacks were introduced in Dinur and Shamir (2009) as a cryptanalytic technique that requires only black box access to the underlying cryptosystem. The attack exploits the existence of low degree polynomial representation of a single output bit (as a function of the key and plaintext bits) in order to recover the secret key. Although cube attacks can be applied in principle to almost any cryptosystem, most block ciphers iteratively apply a highly non-linear round function (based on Sboxes or arithmetic operations) a large number of times which makes them resistant to cube attacks. On the other hand, many stream ciphers (such as Trivium (De Cannière and Preneel 2008)), are built using linear or low degree components and are natural targets for cube attacks. In this paper, we describe in detail how to apply cube attacks to stream ciphers in various settings with different assumptions on the target stream cipher and on the data available to the attacker.
引用
收藏
页码:217 / 232
页数:15
相关论文
共 50 条
  • [1] Applying cube attacks to stream ciphers in realistic scenarios
    Dinur, Itai
    Shamir, Adi
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 217 - 232
  • [2] Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers
    Pometun, S. A.
    [J]. JOURNAL OF AUTOMATION AND INFORMATION SCIENCES, 2009, 41 (02) : 67 - 80
  • [3] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    [J]. IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [4] Linear attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    [J]. Cryptology and Information Security Series, 2011, 7 : 55 - 85
  • [5] Correlation attacks on stream ciphers
    Penzhorn, WT
    [J]. AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [6] Linear Extension Cube Attack on Stream Ciphers
    Ding, Liren
    Wang, Yongjuan
    Li, Zhufeng
    [J]. MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 139 - 156
  • [7] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    [J]. 2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [8] An overview of distinguishing attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    Brynielsson, Lennart
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 71 - 94
  • [9] FAST CORRELATION ATTACKS ON STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 301 - 314
  • [10] An overview of distinguishing attacks on stream ciphers
    Martin Hell
    Thomas Johansson
    Lennart Brynielsson
    [J]. Cryptography and Communications, 2009, 1 : 71 - 94