期刊文献+

对序列密码算法的改进Cube攻击 被引量:1

Improved cube attack on stream ciphers
下载PDF
导出
摘要 Cube攻击是近来年兴起的攻击手段,针对序列密码算法提出改进的Cube攻击。将代数攻击与Cube相结合,把代数攻击作为Cube攻击的基础,以降低Cube攻击的复杂度。在前人研究的基础上对零化子与Cube攻击的结合方式进行扩展,将改进的攻击应用于Lili-128算法上,仅用三维Cube集合在数据复杂度210之内即可恢复88比特密钥。 Recently, Cube attack has achieved lots of attention. In this paper the improved Cube attack is proposed against the stream ciphers. The improved attack combines Cube attack with algebraic attack with the latter one being the base of the former one, which renders the decrease of the complexity. Based on the former research, the combination forms of annihi-lators and Cube attack are extended. Meanwhile, the improved attack is applied to Lili-128 algorithm and 88 key bits are recovered within the data complexity of 210 through some 3 dimensional cubes.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第21期111-115,共5页 Computer Engineering and Applications
关键词 Cube攻击 代数攻击 零化子 结合 序列密码 Cube attack algebraic attack annihilator combination stream cipher
  • 相关文献

参考文献15

  • 1Dinur I,Shamir A.Cube attack on tweakable black box polynomials[C]//Advances in Cryptology-EUROCRYPT2009.Berlin Heidelberg:Springer,2009:278-299.
  • 2Fouque P A,Vannet T.Improving key recovery to 784 and799 rounds of trivium using optimized cube attacks[EB/OL].[2013-09-08].http://fse2013.spms.ntu.edu.sg/.
  • 3Dinur I,Shamir A.Breaking grain-128 with dynamic cube attacks[C]//Fast Software Encryption.Berlin Heidelberg:Springer,2011:167-187.
  • 4Dinur I,Güneysu T,Paar C,et al.An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware[C]//Advances in Cryptology-ASIACRYPT2011.Berlin Heidelberg:Springer,2011:327-343.
  • 5Zhao Xinjie,Wang Tao,Guo Shize.Improved side channel cube attacks on PRESENT[EB/OL].[2013-09-08].http://eprint.iacr.org/2011/165.
  • 6Abdul-Latip S F,Reyhanitabar M R,Susilo W,et al.Extended cubes:enhancing the cube attack by extracting low-degree non-linear equations[C]//Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security,2011:296-305.
  • 7Bard G V,Courtois N T,Nakahara J,et al.Algebraic,AIDA/cube and side channel analysis of KATAN family of block ciphers[C]//Progress in Cryptology-INDOCRYPT2010.Berlin Heidelberg:Springer,2010:176-196.
  • 8Abdul-Latip S F,Reyhanitabar M R,Susilo W,et al.Fault analysis of the KATAN family of block ciphers[C]//Information Security Practice and Experience.Berlin Heidelberg:Springer,2012:319-336.
  • 9Aumasson J P,Meier W,Dinur I.Cube testers and key recovery attacks on reduced round MD6 and trivium[C]//Fast Software Encryption.Berlin Heidelberg:Springer,2009:1-22.
  • 10Courtois N T,Meier W.Algebraic attacks on stream ciphers with linear feedback[C]//Advances in CryptologyEUROCRYPT 2003.Berlin Heidelberg:Springer,2003:345-359.

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部