首页> 外文会议>Australasian Conference on Information Security and Privacy >Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
【24h】

Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems

机译:通过曲线分区改进四边形,百分比和薄机的代数密码分析

获取原文

摘要

We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is denned. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we achieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.
机译:我们提出了通过图划分预处理多项式方程的系统的新方法。多项式方程的系统的可变共享图表denned。如果这样的图表被断开,然后方程的相应系统可以分成更小的可单独解决。这可以提供在计算该溶液系统中的巨大的加速,但不太可能发生随机地或在应用程序。然而,通过删除在图上某些顶点,可变共享图形可以以平衡的方式断开,且在转多项式方程的系统将被分成近相等尺寸的较小的系统。在图论而言,这个过程等同于找到具有最小权重的顶点分离器均衡顶点分区。发现这些顶点分区的技术进行了讨论,并且实验,以评估其对一般图和多项式方程的系统的实用性。在对称密码代数分析这种方法的应用都:对于QUAD家庭流密码,我们展示了一个恶意方如何能够制造符合系统,可以很容易被破坏。对于流密码Bivium和Trivium的,我们实现了对他们的代数攻击,主要在部分关键的猜测情况显著的加速。在上述每种情况下,所涉及的多项式方程的系统是非常适合于我们的图分割方法。这些结果可能会打开一个新的途径,用于评估对代数攻击对称密码算法的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利