首页> 外文会议>International Conference on Information and Communications Security >A New General Method of Searching for Cubes in Cube Attacks
【24h】

A New General Method of Searching for Cubes in Cube Attacks

机译:在多维数据集攻击中寻找多维数据集的新方法

获取原文

摘要

Cube attack, proposed by Dinur and Shamir at EURO-CRYPT 2009, is one of general and powerful cryptanalytic techniques against symmetric-key cryptosystems. However, it is quite time consuming to search for large cubes using the existing techniques, e.g., random walk, and practically infeasible to execute the cube attack when the size of cube exceeds an experimental range, e.g., 50. Thus, how to find favorite cubes is still an intractable problem. In this paper, a new general method of searching for cubes in cube attacks, called iterative walk, is proposed. Iterative walk takes the technique numeric mapping proposed at CRYPTO 2017 as a tool, which is used to test cubes and find out the best cubes among them. This new method consists of two concrete techniques, called incremental iterative walk and decremental iterative walk, respectively. Both of them split the process of searching for cubes with large size into several iterative processes, each of which aims at searching for a 'best' set of input variables with small size. After each iterative process, the input variables in the obtained 'best' set are added to (or dropped from) the cube in incremental (or decremental) iterative walk. As illustrations, we apply it to the authenticated encryption cipher ACORN v3, which was selected as one of seven finalists of CAESAR competition. Some new distinguishing attacks on round reduced variants of ACORN v3 are obtained.
机译:Dinure和Shamir在Euro-Crypt 2009上提出的立方体攻击是针对对称关键密码系统的一般和强大的密码技术之一。然而,使用现有技术搜索大型立方体,例如随机步行,并且实际上不可行地执行多维数据集的大小超过实验范围,例如50.因此,如何找到最喜欢的立方体仍然是一个难以解决的问题。在本文中,提出了一种在Cube攻击中寻找多维数据集,称为迭代步行的新一般方法。迭代步行采用Crypto 2017中提出的技术数值映射作为工具,用于测试立方体并找出它们之间的最佳立方体。这种新方法分别由两个具体技术组成,称为增量迭代步行和递减迭代步行。它们都拆分了在几个迭代过程中搜索具有大尺寸的多维数据集的过程,每个过程都针对搜索具有小尺寸的“最佳”的输入变量集。在每个迭代过程之后,所获得的“最佳”集中的输入变量被添加到增量(或递减)迭代步行中的多维数据集中的(或从)。作为插图,我们将其应用于经过身份验证的加密密码橡子V3,该V3被选为凯撒竞争的七名决赛选手之一。获得了对圆形V3的圆形变化的一些新的区别攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号