Filters








242 Hits in 3.6 sec

Attacks Against Filter Generators Exploiting Monomial Mappings [chapter]

Anne Canteaut, Yann Rotella
2016 Lecture Notes in Computer Science  
It is proved here that this monomial equivalence does not affect the resistance of the generator against algebraic attacks, while it usually impacts the resistance to correlation attacks.  ...  Most importantly, a more efficient attack can often be mounted by considering non-bijective monomial mappings.  ...  It follows that the attack applied to F has the same complexity as the attack against the original filter generator.  ... 
doi:10.1007/978-3-662-52993-5_5 fatcat:z7aaqhcxfvcclntkwmwgym44e4

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher

Sandip Karmakar, Dipanwita Roy Chowdhury
2011 International Workshop on Cellular Automata and Discrete Complex Systems  
Finally, the proposed cipher is shown to be resistant against known existing attacks.  ...  However, a number of attacks are mounted on these type of ciphers. Cellular Automata (CA) has recently been chosen as a suitable structure for crypto-primitives.  ...  The d-monomial test also produce fairly good result against NOCAS. Finally, we have shown that NOCAS is expected to resistant against popularly known existing attacks.  ... 
dblp:conf/automata/KarmakarC11 fatcat:it5n33dffvchllg7vjir4acqja

NOCAS : A Nonlinear Cellular Automata Based Stream Cipher

Sandip Karmakar, Dipanwita Roy Chowdhury
2011 Discrete Mathematics & Theoretical Computer Science  
Finally, the proposed cipher is shown to be resistant against known existing attacks.  ...  However, a number of attacks are mounted on these type of ciphers. Cellular Automata (CA) has recently been chosen as a suitable structure for crypto-primitives.  ...  The d-monomial test also produce fairly good result against NOCAS. Finally, we have shown that NOCAS is expected to resistant against popularly known existing attacks.  ... 
doi:10.46298/dmtcs.2970 fatcat:qzqatfyxkbg57lxdfucfsk3gn4

An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG [article]

Carla Mascia, Enrico Piccione, Massimiliano Sala
2022 arXiv   pre-print
Starting from the well-known attack due to Courtois and Meier, we design an attack especially effective against nonlinear filter generators.  ...  In this paper, we propose a new algebraic attack on stream ciphers.  ...  In this paper, we propose a new form of algebraic attack, which is especially effective against nonlinear filter generators. We show with two toy examples how the attack can be performed in practice.  ... 
arXiv:2112.12268v2 fatcat:4m7nwccygrdrddjx3565pq5ica

Two Attacks Against the HBB Stream Cipher [chapter]

Antoine Joux, Frédéric Muller
2005 Lecture Notes in Computer Science  
This idea of using CAs in such constructions was initially proposed by Sarkar at Crypto'02, in order to instantiate its new Filter-Combiner model. In this paper, we show two attacks against HBB.  ...  The resulting attack is very efficient since it recovers the secret key by processing a chosen message of length only 2 Kbytes. Then we describe an algebraic attack against the basic mode of HBB.  ...  Algebraic attacks exploit polynomial equations describing exactly an algorithm.  ... 
doi:10.1007/11502760_22 fatcat:rgmdf7j3fjgejblq5vk6qreria

Ten years of cube attacks [article]

Marco Cianfriglia, Elia Onofri, Silvia Onofri, Marco Pedicini
2022 IACR Cryptology ePrint Archive  
Finally, in the appendix, we provide an in-depth description of the kite attack framework, a cipher independent tool we firstly proposed in 2018 that implements the kite attack on GPUs.  ...  Since then, this attack has received both many criticisms and endorsements from crypto community; this work aims at revising and collecting the many attacks that have been proposed starting from it.  ...  Monomial set generation (y S ): is the natural mapping of the previous notation to a set S of vectors in Z N , in other words: y S = {y s | s ∈ S} .  ... 
dblp:journals/iacr/CianfrigliaOOP22 fatcat:x2iwg2lwj5fzfnfz7wspbjp3xq

Upper Bounds on Algebraic Immunity of Boolean Power Functions [chapter]

Yassir Nawaz, Guang Gong, Kishan Chand Gupta
2006 Lecture Notes in Computer Science  
We also generalize this idea to Boolean polynomial functions.  ...  Algebraic attacks have received a lot of attention in studying security of symmetric ciphers.  ...  We can refer to them as polynomial functions or mappings. For example the filter function f : F 2 16 → F 2 used in the stream cipher SFINKS [4] is a component of the inverse mapping in F 2 16 .  ... 
doi:10.1007/11799313_24 fatcat:pc33o324dzaatlplmd7f7bctte

Attacks and Countermeasures for White-box Designs [chapter]

Alex Biryukov, Aleksei Udovenko
2018 Advances in Industrial Control  
In this paper we investigate this possibility and present multiple generic attacks against masked white-box implementations. We use the term "masking" in a very broad sense.  ...  The most common method protecting against such side-channel attacks is masking. Therefore, masking can be used in white-box implementations to protect against the DCA attack.  ...  The main advantage of this attack is its generality. It works against general decoder functions even with additional observable noise.  ... 
doi:10.1007/978-3-030-03329-3_13 fatcat:ekhxyir2qjbzveawcgss26xqx4

The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks

Matthias Hamann, Alexander Moch, Matthias Krause, Vasily Mikhalev
2022 IACR Transactions on Symmetric Cryptology  
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher's internal state size.  ...  Further, we present a proof that CIVK provides full security with regard to the volatile internal state length against distinguishing attacks.  ...  Further, we thank Tobias Horn for his analysis of Draco's resistance against cube attacks.  ... 
doi:10.46586/tosc.v2022.i2.1-42 dblp:journals/tosc/HamannMKM22 fatcat:27tzgbwudfddnmd5pbfiolfkz4

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff [article]

Tingting Cui, Lorenzo Grassi
2020 IACR Cryptology ePrint Archive  
In this paper, we present key-recovery attacks on reduced-round Xoofff.  ...  We next extend such attack on Xoofff instantiated with 3-/4-round Xoodoo in the expansion layer by making use of Meet-in-the-Middle algebraic attacks and the linearization technique.  ...  Authors thank him for his suggestion to exploit such symmetry property as a possible starting point for key-recovery attacks on the expansion part of Xoofff.  ... 
dblp:journals/iacr/CuiG20 fatcat:3m2tejbmafevth5ryac6kb4j4a

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations [article]

Fukang Liu, Takanori Isobe, Willi Meier
2021 IACR Cryptology ePrint Archive  
We further reveal that Dasta is more vulnerable against our attacks than Rasta for its usage of a linear layer composed of an ever-changing bit permutation and a deterministic linear transform.  ...  Especially, we thank one reviewer for suggesting we try different monomial orderings to compute the reduced Gröbner basis for the smallscale χ operation.  ...  In the case of the preliminary version of FLIP, Duval, Lallemand and Rotella revealed some weaknesses in its filter function and exploited them to devise an efficient full key recovery attack based on  ... 
dblp:journals/iacr/LiuIM21 fatcat:mtvkfa6kjvesbdoomskfucxhyi

Mathematical Aspects of Division Property [article]

Phil Hebborn, Gregor Leander, Aleksei Udovenko
2022 IACR Cryptology ePrint Archive  
Division property can also be used to provide arguments for security of primitives against these attacks.  ...  It aims to find integral distinguishers and cube attacks, which exploit weakness in the algebraic normal forms of the output coordinates of the involved vectorial Boolean functions.  ...  One important attack vector is higher-order differential cryptanalysis [34] , which exploits a low algebraic degree of a cipher or, more generally, a missing monomial in the ANF.  ... 
dblp:journals/iacr/HebbornLU22 fatcat:ej7tftjjubdq3odbz7pql4pvci

Revealing the Weakness of Addition Chain Based Masked SBox Implementations

Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Moreover, we study the resistance of addition chain implementations against profiled attacks. We find that some monomials with smaller output size leak more information than the SBox output.  ...  Thus, our attacks demonstrate that this property of balanced functions does not apply to unbalanced functions.  ...  Therefore, the monomial computation with maximum PD may not be the weakest against practical attacks.  ... 
doi:10.46586/tches.v2021.i4.326-350 fatcat:tro5q42p4jfspoyhnw27cb4lrq

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
It is supposed to provide 80-bit security against key recovery attacks.  ...  generator.  ...  First, an attacker could try to exploit this fact to launch a distinguishing attack.  ... 
doi:10.46586/tosc.v2017.i1.45-79 fatcat:aap4zegsgvfbhe5ly76inmpkrm

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

Matthias Hamann, Matthias Krause, Willi Meier
2017 IACR Transactions on Symmetric Cryptology  
It is supposed to provide 80-bit security against key recovery attacks.  ...  generator.  ...  First, an attacker could try to exploit this fact to launch a distinguishing attack.  ... 
doi:10.13154/tosc.v2017.i1.45-79 dblp:journals/tosc/HamannKM17 fatcat:yy3mitkbqfftlbhxdbw7nupkzu
« Previous Showing results 1 — 15 out of 242 results