【24h】

Key-Recovery Attacks on ASASA

机译:asasa的键恢复攻击

获取原文

摘要

The ASASA construction is a new design scheme introduced at ASIACRYPT 2014 by Biruykov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key encryption schemes, a secret-key scheme, as well as super S-box subcomponents of a white-box scheme. However one of the two public-key cryptosystems was recently broken at CRYPTO 2015 by Gilbert, Plut and Treger. As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2~(63) and 2~(39) respectively (the security parameter is 128 bits in both cases). Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces its security to solving an LPN instance with tractable parameters. This allows key recovery in time complexity 2~(56). Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks an instance claiming 64 bits of security under one minute on a single desktop computer.
机译:ASASA建设是Biruykov,Boruykov,Bouillaguet和Khovratovich在亚洲推出的新设计方案。通过构建两个公钥加密方案,秘密关键方案以及白盒方案的超级S盒子组件来说明其多功能性。然而,两种公钥密码系统中的一个最近被吉尔伯特,兰布特和霸王员在Crypto 2015年破坏了。作为我们的主要贡献,我们提出了一种能够立即打破秘密关键方案的新代数次要恢复攻击,以及分别复杂2〜(63)和2〜(39)的剩余公钥方案(安全参数在两种情况下为128位)。此外,我们对同一公钥计划提供了第二次对独立兴趣的攻击,其启发式降低了其安全性参数解决LPN实例的安全性。这允许在时间复杂度2〜(56)中的键恢复。最后,作为一个副本,我们概述了对白盒方案的一个非常有效的启发式攻击,该攻击是在单个桌面计算机上一分钟内突出一个索取64位安全性的实例。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号