...
首页> 外文期刊>Computers, IEEE Transactions on >Cube Attacks on Non-Blackbox Polynomials Based on Division Property
【24h】

Cube Attacks on Non-Blackbox Polynomials Based on Division Property

机译:基于除法属性的非黑盒多项式的立方攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the cube attack basically analyzes it by regarding it as a blackbox. Therefore, the cube attack is an experimental attack, and we cannot evaluate the security when the size of cube exceeds an experimental range, e.g., 40. In this paper, we propose cube attacks on non-blackbox polynomials. Our attacks are developed by using the division property, which is recently applied to various block ciphers. The clear advantage is that we can exploit large cube sizes because it never regards the cipher as a blackbox. We apply the new cube attack to Trivium, Grain128a, ACORN and Kreyvium. As a result, the secret keys of 832-round Trivium, 183-round Grain128a, 704-round ACORN and 872-round Kreyvium are recovered. These attacks are the current best key-recovery attack against these ciphers.
机译:多维数据集攻击是一种强大的密码分析技术,对流密码特别强大。由于我们需要分析多维数据集攻击中流密码的复杂结构,因此多维数据集攻击基本上通过将其视为黑盒来对其进行分析。因此,多维数据集攻击是一种实验攻击,当多维数据集的大小超出实验范围(例如40)时,我们无法评估安全性。在本文中,我们提出了针对非黑盒多项式的多维数据集攻击。我们的攻击是通过使用除法属性开发的,该属性最近已应用于各种分组密码。明显的优势是我们可以利用较大的多维数据集,因为它永远不会将密码视为黑盒。我们将新的多维数据集攻击应用于Trivium,Grain128a,ACORN和Kreyvium。结果,恢复了832轮Trivium,183轮Grain128a,704轮ACORN和872轮Kreyvium的密钥。这些攻击是针对这些密码的当前最佳密钥恢复攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号