首页> 外文期刊>IEEE Transactions on Computers >Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
【24h】

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

机译:改进的基于分割属性的多维数据集攻击,开发了Superpoly的代数属性

获取原文
获取原文并翻译 | 示例
           

摘要

At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond practical reach. However, assumptions are made to validate their attacks. In this paper, we further formulate the algebraic properties of the superpoly in one framework to facilitate cube attacks in more successful applications: we propose the "flag" technique to enhance the precision of MILP models, which enable us to identify proper non-cube IV assignments; a degree evaluation algorithm is presented to upper bound the degree of the superpoly s.t. the superpoly can be recovered without constructing its whole truth table and overall complexity of the attack can be largely reduced; we provide a divide-and-conquer strategy to TRIVIUM-like stream ciphers namely TRIVIUM, Kreyvium, TriviA-SC1/2 so that the large scale MILP models can be split into several small solvable ones enabling us to analyze TRIVIUM-like primitives with more than 1000 initialization rounds; finally, we provide a term enumeration algorithm for finding the monomials of the superpoly, so that the complexity of many attacks can be further reduced. We apply our techniques to attack the initialization of several ciphers namely 839-round TRIVIUM, 891-round Kreyvium, 1009-round TriviA-SC1, 1004-round TriviA-SC2, 184-round Grain-128a and 750-round ACORN respectively.
机译:Todo等人在CRYPTO 2017和2018年IEEE计算机事务上。提出了基于分区属性的多维数据集攻击方法,这使得有可能发起尺寸远远超出实际范围的多维数据集的多维数据集攻击。但是,进行了验证其攻击的假设。在本文中,我们进一步在一个框架中公式化了superpoly的代数性质,以在更成功的应用中促进多维数据集攻击:我们提出了“ flag”技术来增强MILP模型的精度,从而使我们能够识别出适当的非立方体IV作业;提出了一种程度评估算法,以确定超级垄断的程度。无需构建整个事实表就可以恢复超级垄断,并且可以大大降低攻击的整体复杂性;我们为类TRIVIUM的流密码(即TRIVIUM,Kreyvium,TriviA-SC1 / 2)提供了分而治之的策略,因此大规模MILP模型可以分为几个小的可解模型,从而使我们能够分析类TRIVIUM的原始数据,超过1000轮初始化;最后,我们提供了一种术语枚举算法来查找垄断的单项式,从而可以进一步降低许多攻击的复杂性。我们运用我们的技术来攻击几种密码的初始化,分别是839轮TRIVIUM,891轮Kreyvium,1009轮TriviA-SC1、1004轮TriviA-SC2、184轮Grain-128a和750轮ACORN。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号