نتایج جستجو برای: cube attack

تعداد نتایج: 91114  

Journal: :IACR Cryptology ePrint Archive 2013
Frank-M. Quedenfeld Christopher Wolf

Cube attacks can be used to analyse and break cryptographic primitives that have an easy algebraic description. One example for such a primitive is the stream cipher Trivium. In this article we give a new framework for cubes that are useful in the cryptanalytic context. In addition, we show how algebraic modelling of a cipher can greatly be improved when taking both cubes and linear equivalence...

Journal: :IACR Cryptology ePrint Archive 2014
Liren Ding Yongjuan Wang Zhufeng Li

Basing on the original Cube attack, this paper proposes an improved method of Cube attack on stream ciphers, which makes improvement on the pre-processing phase of the original attack. The new method can induce maxterms of higher-order from those of lower-order by the trade-off between time and space, thus recovering more key bits and reducing the search complexity on higher-dimension. In this ...

Journal: :IACR Cryptology ePrint Archive 2015
Pawel Morawiecki Josef Pieprzyk Michal Straus Marian Srebrny

In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and ...

Journal: :IACR Cryptology ePrint Archive 2009
Itai Dinur Adi Shamir

In this paper we formalize the notion of leakage attacks on iterated block ciphers, in which the attacker can find (via physical probing, power measurement, or any other type of side channel) one bit of information about the intermediate state of the encryption after each round. Since bits computed during the early rounds can be typically represented by low degree multivariate polynomials, cube...

2017
Raghvendra Rohit Riham AlTawy Guang Gong

The cube attack is a powerful cryptanalytic tool for the analysis of stream ciphers, which until recently were investigated in a blackbox scenario with a minimal consideration to their internal and polynomial structures. In this paper, we analyze the lightweight stream cipher WG5, which offers 80-bit security, using cube attacks in a non-blackbox polynomial setting employing the division proper...

Journal: :IACR Cryptology ePrint Archive 2010
Bo Zhu Wenye Yu Tao Wang

Recently, various cryptanalysis methods related to Cube Attack have attracted a lot of interest. We designed a practical platform to perform such cryptanalysis attacks. We also developed a web-based application at http://cube-attack.appspot.com/, which is open to public for simple testing and verification. In this paper, we focus on linearity testing and try to verify the data provided in sever...

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :IACR Transactions on Symmetric Cryptology 2018

Journal: :Journal of Systems and Software 2013
Xinjie Zhao Shize Guo Fan Zhang Tao Wang Zhijie Jerry Shi Huiying Liu Keke Ji Jing Huang

Side-channel cube attack (SCCA) is a powerful cryptanalysis technique that combines side-channel attack and cube attack. This paper proposes several advanced techniques to improve the Hamming weight-based SCCA (HW-SCCA) on the block cipher PRESENT. The new techniques utilize non-linear equations and an iterative scheme to extract more information from leakage. The new attacks need only 2 chosen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید