首页> 外文会议>Information security and privacy >Improved Algebraic Cryptanalysis of QUAD,Bivium and Trivium via Graph Partitioning on Equation Systems
【24h】

Improved Algebraic Cryptanalysis of QUAD,Bivium and Trivium via Graph Partitioning on Equation Systems

机译:通过方程系统上的图划分改进QUAD,Bivium和Trivium的代数密码分析

获取原文
获取原文并翻译 | 示例

摘要

We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we achieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.
机译:我们提出了一种通过图形划分对多项式方程组进行预处理的新方法。定义了多项式方程组的变量共享图。如果断开了该图,则可以将相应的方程组分解为较小的方程组,可以单独求解。这可以极大地加快系统解决方案的计算速度,但不可能随机发生或在应用程序中发生。但是,通过删除图上的某些顶点,可以以平衡的方式断开变量共享图,然后将多项式方程组分解为大小近似相等的较小系统。用图论的术语来说,此过程等效于找到具有最小权重顶点分隔符的平衡顶点分区。讨论了找到这些顶点分区的技术,并进行了实验以评估其在一般图形和多项式方程组中的实用性。介绍了这种方法在对称密码的代数密码分析中的应用:对于QUAD系列流密码,我们展示了恶意方如何制造易于破坏的合规系统。对于Bivium和Trivium流密码,我们主要在部分关键猜测场景下实现了针对它们的代数攻击的显着加速。在每种情况下,涉及的多项式方程组都非常适合我们的图划分方法。这些结果可能为评估对称密码针对代数攻击的安全性开辟新途径。

著录项

  • 来源
    《Information security and privacy》|2010年|p.19-36|共18页
  • 会议地点 Sydney(AU);Sydney(AU)
  • 作者单位

    Information Security Institute, Queensland University of Technology,Brisbane QLD 4000, Australia;

    Mathematics Department, Fordham University, The Bronx NY 10458, USA;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

  • 入库时间 2022-08-26 14:27:40

相似文献

  • 外文文献
  • 中文文献
  • 专利