Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

被引:50
|
作者
Wang, Qingju [1 ,2 ,3 ]
Hao, Yonglin [4 ]
Todo, Yosuke [5 ]
Li, Chaoyun [6 ]
Isobe, Takanori [7 ]
Meier, Willi [8 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[2] Tech Univ Denmark, Lyngby, Denmark
[3] Univ Luxembourg, SnT, Esch Sur Alzette, Luxembourg
[4] State Key Lab Cryptol, Beijing, Peoples R China
[5] NTT Secure Platform Labs, Tokyo, Japan
[6] Katholieke Univ Leuven, IMEC, COSIC, Dept Elect Engn ESAT, Leuven, Belgium
[7] Univ Hyogo, Kobe, Hyogo, Japan
[8] FHNW, Windisch, Switzerland
来源
基金
中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Cube attack; Division property; MILP; TRIVIUM; Kreyvium; Grain-128a; Acorn; Clique; KEY RECOVERY;
D O I
10.1007/978-3-319-96884-1_10
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especially for stream ciphers. Aiming at recovering some secret key bits, the adversary reconstructs a superpoly with the secret key bits involved, by summing over a set of the plaintexts/IV which is called a cube. Traditional cube attack only exploits linear/quadratic superpolies. Moreover, for a long time after its proposal, the size of the cubes has been largely confined to an experimental range, e.g., typically 40. These limits were first overcome by the division property based cube attacks proposed by Todo et al. at CRYPTO 2017. Based on MILP modelled division property, for a cube (index set) I, they identify the small (index) subset J of the secret key bits involved in the resultant superpoly. During the precomputation phase which dominates the complexity of the cube attacks, 2(vertical bar I vertical bar+vertical bar J vertical bar) encryptions are required to recover the superpoly. Therefore, their attacks can only be available when the restriction vertical bar I vertical bar+vertical bar J vertical bar < n is met. In this paper, we introduced several techniques to improve the division property based cube attacks by exploiting various algebraic properties of the superpoly. 1. We propose the "flag" technique to enhance the preciseness of MILP models so that the proper non-cube IV assignments can be identified to obtain a non-constant superpoly. 2. A degree evaluation algorithm is presented to upper bound the degree of the superpoly. With the knowledge of its degree, the superpoly can be recovered without constructing its whole truth table. This enables us to explore larger cubes I's even if vertical bar I vertical bar + vertical bar J vertical bar >= n. 3. We provide a term enumeration algorithm for finding the monomials of the superpoly, so that the complexity of many attacks can be further reduced. As an illustration, we apply our techniques to attack the initialization of several ciphers. To be specific, our key recovery attacks have mounted to 839-round TRIVIUM, 891-round Kreyvium, 184-round Grain-128a and 750-round ACORN respectively.
引用
收藏
页码:275 / 305
页数:31
相关论文
共 13 条
  • [1] Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
    Hao, Yonglin
    Isobe, Takanori
    Jiao, Lin
    Li, Chaoyun
    Meier, Willi
    Todo, Yosuke
    Wang, Qingju
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (10) : 1470 - 1486
  • [2] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [3] Cube Attacks on Non-Blackbox Polynomials Based on Division Property
    Todo, Yosuke
    Isobe, Takanori
    Hao, Yonglin
    Meier, Willi
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (12) : 1720 - 1736
  • [4] Cube Attacks on Non-Blackbox Polynomials Based on Division Property
    Todo, Yosuke
    Isobe, Takanori
    Hao, Yonglin
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 250 - 279
  • [5] Massive Superpoly Recovery with a Meet-in-the-Middle Framework Improved Cube Attacks on Trivium and Kreyvium
    He, Jiahui
    Hu, Kai
    Lei, Hao
    Wang, Meiqin
    ADVANCES IN CRYPTOLOGY, PT I, EUROCRYPT 2024, 2024, 14651 : 368 - 397
  • [6] A New Correlation Cube Attack Based on Division Property
    Che, Cheng
    Tian, Tian
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 53 - 71
  • [7] Modeling for Three-Subset Division Property Without Unknown Subset Improved Cube Attacks Against Trivium and Grain-128AEAD
    Hao, Yonglin
    Leander, Gregor
    Meier, Willi
    Todo, Yosuke
    Wang, Qingju
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 466 - 495
  • [8] Security Analysis of WAGE Against Division Property Based Cube Attack
    Das, Bijoy
    Das, Abhijit
    Chowdhury, Dipanwita Roy
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 492 - 506
  • [9] The decimated sample based improved algebraic attacks on the nonlinear filters
    Mihaljevic, MJ
    Imai, H
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 310 - 323
  • [10] Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
    Karthika, S. K.
    Singh, Kunwar
    DISCRETE APPLIED MATHEMATICS, 2023, 325 : 63 - 78