首页> 外文会议>International Conference on Selected Areas in Cryptography >Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
【24h】

Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks

机译:具有TMD权衡攻击的完全萌芽的实用密码分析

获取原文
获取外文期刊封面目录资料

摘要

The internal state size of a stream cipher is supposed to be at least twice the key length to provide resistance against the conventional Time-Memory-Data (TMD) tradeoff attacks. This well adopted security criterion seems to be one of the main obstacles in designing, particularly, ultra lightweight stream ciphers. At FSE 2015, Armknecht and Mikhalev proposed an elegant design philosophy for stream ciphers as fixing the key and dividing the internal states into equivalence classes where any two different keys always produce non-equivalent internal states. The main concern in the design philosophy is to decrease the internal state size without compromising the security against TMD tradeoff attacks. If the number of equivalence classes is more than the cardinality of the key space, then the cipher is expected to be resistant against TMD tradeoff attacks even though the internal state (except the fixed key) is of fairly small length. Moreover, Armknecht and Mikhalev presented a new design, which they call Sprout, to embody their philosophy. In this work, ironically, we mount a TMD tradeoff attack on Sprout within practical limits using 2~d output bits in 2~(71-d) encryptions of Sprout along with 2~d table lookups. The memory complexity is 2~(86-d) where d ≤ 40. In one instance, it is possible to recover the key in 2~(31) encryptions and 2~(40) table lookups if we have 2~(40) bits of keystream output by using tables of 770 Terabytes in total. The offline phase of preparing the tables consists of solving roughly 2~(41.3) systems of linear equations with 20 unknowns and an effort of about 2~(35) encryptions. Furthermore, we mount a guess-and-determine attack having a complexity about 2~(68) encryptions with negligible data and memory. We have verified our attacks by conducting several experiments. Our results show that Sprout can be practically broken.
机译:流密码的内部状态大小应该是关键长度的至少两倍,以提供对传统时间内存数据(TMD)权衡攻击的阻力。这种采用的安全标准似乎是设计中的主要障碍之一,特别是超轻型流密码。在FSE 2015年,Armknecht和Mikhalev提出了一个优雅的流式密码设计理念,因为修复了键并将内部状态分成了任何两个不同键总是产生非等效内部状态的等价类别。设计理念的主要关注值是降低内部状态规模,而不会损害对TMD权衡攻击的安全性。如果等效类的数量超过关键空间的基数,那么即使内部状态(固定键除外)长度相当小,密码也会抵抗TMD权衡攻击。此外,Armknecht和Mikhalev展示了一种新的设计,他们称之为萌芽,以体现他们的哲学。在这项工作中,具有讽刺意味的是,我们在使用2〜(71-d)沟槽的2〜(71-d)加密的2〜d输出位以及2〜d表查找中,在实际限制内对萌芽安装TMD权衡攻击。内存复杂性为2〜(86-d),其中d≤40.在一个实例中,如果我们有2〜(40),可以恢复2〜(31)加密和2〜(40)表查找中的键通过使用770 terabytes的表来使用keystream输出的位。准备表的离线阶段包括求解大约2〜(41.3)的线性方程系统,其中20个未知数和大约2〜(35)加密的努力。此外,我们安装了一个猜测和确定的攻击,该攻击大约2〜(68)加密,数据和内存可忽略不计。我们通过进行几个实验验证了我们的攻击。我们的结果表明,豆芽可以实际破碎。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号