An Experimentally Veri ed Attack on Full Grain-128 Using Dedicated Recon gurable Hardware
نویسندگان
چکیده
In this paper we describe the rst single-key attack which can recover the full key of the full version of Grain-128 for arbitrary keys by an algorithm which is signi cantly faster than exhaustive search (by a factor of about 2). It is based on a new version of a cube tester, which uses an improved choice of dynamic variables to eliminate the previously made assumption that ten particular key bits are zero. In addition, the new attack is much faster than the previous weak-key attack, and has a simpler key recovery process. Since it is extremely di cult to mathematically analyze the expected behavior of such attacks, we implemented it on RIVYERA, which is a new massively parallel recon gurable hardware, and tested its main components for dozens of random keys. These tests experimentally veri ed the correctness and expected complexity of the attack, by nding a very signi cant bias in our new cube tester for about 7.5% of the keys we tested. This is the rst time that the main components of a complex analytical attack are successfully realized against a full-size cipher with a special-purpose machine. Moreover, it is also the rst attack that truly exploits the con gurable nature of an FPGA-based cryptanalytical hardware.
منابع مشابه
Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware
In this work, we describe the first single-key attack on the full version of Grain-128 that can recover arbitrary keys. Our attack is based on a new version of a cube tester, which is a factor of about 2 faster than exhaustive search. To practically verify our results, we implemented the attack on the reconfigurable hardware cluster RIVYERA and tested the main components of the attack for dozen...
متن کاملAn Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
In this paper we describe the first single-key attack which can recover the full key of the full version of Grain-128 for arbitrary keys by an algorithm which is significantly faster than exhaustive search (by a factor of about 2). It is based on a new version of a cube tester, which uses an improved choice of dynamic variables to eliminate the previously made assumption that ten particular key...
متن کاملReconngurable Processor Board
The concept of dynamic recon gurability combines advantages of hardware and software. The goal is to make use of the structural advantages of hardware without losing the exibility of software. In this paper we present a recon gurable processor board which is based on the concept of dynamic recon gurability. We emphasize on the dynamic recon gurability of the system and the multi-chip module (MC...
متن کاملObject oriented development method for recon®gurable embedded systems
The authors present a novel method for developing recon®gurable systems targeted at embedded system applications. The paper shows how an existing object oriented design method (MOOSE) has been adapted to include recon®gurable hardware (FPGAs). Previous research on recon®gurable computing has concentrated on the ef®cient mapping of algorithms to FPGAs. It must be realised that recon®gurable hard...
متن کاملA Case Study of Algorithm Implementation in Recon gurable Hardware and Software
We present a case study of implementation of a combinatorial search problem in both recon gurable hardware and software. The particular problem is the search for approximate solutions of overconstrained systems of equations over GF(2). The problem is of practical interest in cryptanalysis. We consider the e cient implementation of exhaustive search techniques to nd the best solutions of sets of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011