...
首页> 外文期刊>IEEE Transactions on Computers >Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
【24h】

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

机译:基于改进的分割性质攻击利用超纯的代数特性

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond practical reach. However, assumptions are made to validate their attacks. In this paper, we further formulate the algebraic properties of the superpoly in one framework to facilitate cube attacks in more successful applications: we propose the "flag" technique to enhance the precision of MILP models, which enable us to identify proper non-cube IV assignments; a degree evaluation algorithm is presented to upper bound the degree of the superpoly s.t. the superpoly can be recovered without constructing its whole truth table and overall complexity of the attack can be largely reduced; we provide a divide-and-conquer strategy to TRIVIUM-like stream ciphers namely TRIVIUM, Kreyvium, TriviA-SC1/2 so that the large scale MILP models can be split into several small solvable ones enabling us to analyze TRIVIUM-like primitives with more than 1000 initialization rounds; finally, we provide a term enumeration algorithm for finding the monomials of the superpoly, so that the complexity of many attacks can be further reduced. We apply our techniques to attack the initialization of several ciphers namely 839-round TRIVIUM, 891-round Kreyvium, 1009-round TriviA-SC1, 1004-round TriviA-SC2, 184-round Grain-128a and 750-round ACORN respectively.
机译:在2018年Crypto 2017年和IEEE交易上,Todo等人。提出了基于分部的立方体攻击方法,使得能够使用远远超出实际范围的立方体发射立方体攻击。但是,假设是为了验证他们的攻击。在本文中,我们进一步制定了一个框架中超级聚物的代数特性,以便于更成功的应用程序中的立方体攻击:我们提出了“标志”技术来增强摩尔普型号的精度,这使我们能够识别适当的非立方体IV作业;学位评估算法呈现给超级界限的上限。可以在不构建其整体真理表的情况下恢复超薄,并且攻击的整体复杂性可以很大程度上减少;我们向差异和征服的策略提供琐碎的溪流密码,即琐事,Kreyvium,Trivia-SC1 / 2,使大规模的MILP模型可以分成几个小型可溶性的模型,使我们能够更多地分析琐碎的基元超过1000个初始化轮;最后,我们提供了一种用于找到超级单体的序列枚举算法,从而可以进一步减少许多攻击的复杂性。我们采用技术攻击几个密码的初始化即839个圆形的薄膜,891次粉岭,1009圆形的TRIVIA-SC1,1004圆形琐事-SC2,184圆形粒子-128A和750圆形橡奶。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号