نتایج جستجو برای: cube attack

تعداد نتایج: 91114  

Journal: :IACR Cryptology ePrint Archive 2017
Zheng Li Xiaoyang Dong Xiaoyun Wang

This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al. to analyze Keccak keyed modes. At CT-RSA 2015, Dobraunig et al. applied this method to 5/6-round reduced Ascon, whose structure is similar to Keccak key...

2016
Zahra Ahmadian Shahram Rasoolzadeh Mahmoud Salmasizadeh Mohammad Reza Aref

A little work has ever been performed in cryptanalysis of block ciphers using cube technique. This paper presents a new framework for an efficient key recovery attack on block ciphers using a kind of dynamic cube attack. In this method, a cube tester is positioned at the middle of the cipher which is extended in two directions over the maximum possible upper and lower rounds, provided that some...

Journal: :IACR Transactions on Symmetric Cryptology 2019

2017
Janusz Szmidt

The cube attack has been introduced by Itai Dinur and Adi Shamir [8] as a known plaintext attack on symmetric primitives. The attack has been applied to reduced variants of the stream ciphers Trivium [3, 8] and Grain-128 [2], reduced to three rounds variant of the block cipher Serpent [9] and reduced version of the hash function MD6 [3]. In the special case the attack has appeared in the M. Vie...

2017
Marco Cianfriglia Stefano Guarino Massimo Bernaschi Flavio Lombardi Marco Pedicini

Journal: :IACR Cryptology ePrint Archive 2014
Itai Dinur Pawel Morawiecki Josef Pieprzyk Marian Srebrny Michal Straus

In this paper we mount the cube attack on the Keccak sponge function. The cube attack, formally introduced in 2008, is an algebraic technique applicable to cryptographic primitives whose output can be described as a low-degree polynomial in the input. Our results show that 5and 6-round Keccak sponge function is vulnerable to this technique. All the presented attacks have practical complexities ...

2012
Itai Dinur Tim Güneysu Christof Paar Adi Shamir Ralf Zimmermann

In this work, we describe the first single-key attack on the full version of Grain-128 that can recover arbitrary keys. Our attack is based on a new version of a cube tester, which is a factor of about 2 faster than exhaustive search. To practically verify our results, we implemented the attack on the reconfigurable hardware cluster RIVYERA and tested the main components of the attack for dozen...

Journal: :IACR Cryptology ePrint Archive 2015
Zahra Ahmadian Shahram Rasoolzadeh Mahmoud Salmasizadeh Mohammad Reza Aref

A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. This paper presents a new framework for an efficient key recovery attack on block ciphers based on cube technique. In this method, a cube tester is positioned at the middle of the cipher which is extended in two directions over the maximum possible upper and lower rounds, given that some subkey bits are gue...

Journal: :IACR Transactions on Symmetric Cryptology 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید