Filters








1,701 Hits in 5.6 sec

Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery [chapter]

Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
One of the most significant advantages of this new analysis technique over other variants of cube attacks is that it converts from a weak-key distinguisher to a key recovery attack.  ...  be converted to a key recovery attack.  ...  Acknowledgments We are grateful to the anonymous reviewers for their valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78375-8_23">doi:10.1007/978-3-319-78375-8_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kdhkt6ku3raedgl5s6dyl2ifuu">fatcat:kdhkt6ku3raedgl5s6dyl2ifuu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223052010/http://pdfs.semanticscholar.org/4a08/8979626c4e5172e38b3a7a2f406e635a4bd5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/08/4a088979626c4e5172e38b3a7a2f406e635a4bd5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78375-8_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?

Chen-Dong Ye, Tian Tian
<span title="2019-09-20">2019</span> <i title="IACR Transactions on Symmetric Cryptology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
There is an important assumption, called Weak Assumption, proposed in division property based cube attacks to support the effectiveness of key recovery.  ...  Furthermore, we prove that some best key recovery results given at CRYPTO 2018 on Trivium are actually distinguishing attacks.  ...  Hence these best key recovery attacks are actually distinguishing attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2019.i3.81-102">doi:10.13154/tosc.v2019.i3.81-102</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tosc/YeT19.html">dblp:journals/tosc/YeT19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5sqxlvoy2jfmxpxc5azl2duho4">fatcat:5sqxlvoy2jfmxpxc5azl2duho4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211532/https://tosc.iacr.org/index.php/ToSC/article/download/8358/7708" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/f6/b3f651d046f43dc132d813a5a5ad64e8453c6e41.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2019.i3.81-102"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?

Chen-Dong Ye, Tian Tian
<span title="2019-09-20">2019</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
There is an important assumption, called Weak Assumption, proposed in division property based cube attacks to support the effectiveness of key recovery.  ...  Furthermore, we prove that some best key recovery results given at CRYPTO 2018 on Trivium are actually distinguishing attacks.  ...  Hence these best key recovery attacks are actually distinguishing attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2019.i3.81-102">doi:10.46586/tosc.v2019.i3.81-102</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vye7xgt44jhrbh4lxhy4p2e25a">fatcat:vye7xgt44jhrbh4lxhy4p2e25a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200804230737/https://tosc.iacr.org/index.php/ToSC/article/download/8358/7708/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/5a/b35adbae6e3505354eabde134e1a4c796cbbdca7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2019.i3.81-102"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Breaking Grain-128 with Dynamic Cube Attacks [chapter]

Itai Dinur, Adi Shamir
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers.  ...  from 256 to 213.  ...  In this paper we focus on the specific case of distinguishers obtained from cube testers (see [3] ) and show how to use them in key recovery attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-21702-9_10">doi:10.1007/978-3-642-21702-9_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v6beq6rhpfgsvnzjizoltvdorq">fatcat:v6beq6rhpfgsvnzjizoltvdorq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728194927/https://link.springer.com/content/pdf/10.1007%2F978-3-642-21702-9_10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/d7/f0d7b227b56cbb8c7123d63eb2a01cac9a51d8e3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-21702-9_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cube Attacks on Non-Blackbox Polynomials Based on Division Property [chapter]

Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To execute the key-recovery attack, we have to recover the secret key by using only key streams that attackers can observe.  ...  Note that we cannot use this strategy for the key-recovery attack against many stream ciphers because it is generally impossible to evaluate the backward procedure from key streams.  ...  In contrast to standard cube attack that finds the key by solving a system of (linear) equations in the key bits, dynamic cube attack recovers the secret key by exploiting distinguishers obtained from  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63697-9_9">doi:10.1007/978-3-319-63697-9_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lmr5e32feve5bcuyvvdadyjljy">fatcat:lmr5e32feve5bcuyvvdadyjljy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710053852/http://eprint.iacr.org/2017/306.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/c5/1fc524e0d9a8bb3cce6bdcca2572f1857f2da569.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63697-9_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cube Attacks on Non-Blackbox Polynomials Based on Division Property

Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5jlmyrayyrdazh5awdlsoec77q" style="color: black;">IEEE transactions on computers</a> </i> &nbsp;
To execute the key-recovery attack, we have to recover the secret key by using only key streams that attackers can observe.  ...  Note that we cannot use this strategy for the key-recovery attack against many stream ciphers because it is generally impossible to evaluate the backward procedure from key streams.  ...  In contrast to standard cube attack that finds the key by solving a system of (linear) equations in the key bits, dynamic cube attack recovers the secret key by exploiting distinguishers obtained from  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2018.2835480">doi:10.1109/tc.2018.2835480</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nhzf76civrayznkzun3spx46ri">fatcat:nhzf76civrayznkzun3spx46ri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710053852/http://eprint.iacr.org/2017/306.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/c5/1fc524e0d9a8bb3cce6bdcca2572f1857f2da569.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2018.2835480"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Links between Division Property and Other Cube Attack Variants

Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
<span title="2020-05-07">2020</span> <i title="IACR Transactions on Symmetric Cryptology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
To our knowledge, our results are the current best key-recovery attacks on these two primitives.  ...  Based on such links, we are able to provide several results: Firstly, we give a dynamic cube key-recovery attack on full Grain-128. Compared with Dinur et al.'  ...  Introduction At CRYPTO 2018, Fu et al. proposed a new cube attack variant, referred to as the "IV-representation based cube attack" hereafter, and applied it to a key-recovery attack on 855-round Trivium  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2020.i1.363-395">doi:10.13154/tosc.v2020.i1.363-395</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tosc/HaoJLMTW20.html">dblp:journals/tosc/HaoJLMTW20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2whx4nizzrfurfweptdcsmqokm">fatcat:2whx4nizzrfurfweptdcsmqokm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200515082045/https://tosc.iacr.org/index.php/ToSC/article/download/8569/8140" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/79/da/79dab95fc3428b490e7769c6bf461d7da56ffc27.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tosc.v2020.i1.363-395"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun
<span title="2021-03-19">2021</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ctjq6cpl7vg4pncvotyslbx6ve" style="color: black;">IACR Transactions on Symmetric Cryptology</a> </i> &nbsp;
We apply this method to 7-round Ascon and present several key recovery attacks.  ...  The best known attack on Ascon could only penetrate up to 7 (out of 12) rounds due to Li et al. (ToSC Vol I, 2017).  ...  Acknowledgments The authors would like to thank the reviewers of ToSC 2021 for providing us with insightful comments to improve the quality of the paper. Raghvendra  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2021.i1.130-155">doi:10.46586/tosc.v2021.i1.130-155</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/klhfmmcygbchfjbslcj2gk3vsa">fatcat:klhfmmcygbchfjbslcj2gk3vsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210409152051/https://tosc.iacr.org/index.php/ToSC/article/download/8835/8438" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e1/93/e19350394e417b5065ee9225abb2b16c3cce6078.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tosc.v2021.i1.130-155"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Cube Attacks on Tweakable Black Box Polynomials [chapter]

Itai Dinur, Adi Shamir
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
attack 672 initialization rounds, whereas a cube attack can find the complete key of the same variant in 2 19 bit operations (which take less than a second on a single PC).  ...  Whereas previous attacks were heuristic, had to be adapted to each cryptosystem, had no general complexity bounds, and were not expected to succeed on random looking polynomials, cube attacks are provably  ...  is increased to 735, no previously published attack is faster than exhaustive search, whereas the same cube attack can easily perform full key recovery in 2 30 bit operations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-01001-9_16">doi:10.1007/978-3-642-01001-9_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t7dllpcfcbbrzkxebbsemckd4e">fatcat:t7dllpcfcbbrzkxebbsemckd4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722203614/https://www.iacr.org/archive/eurocrypt2009/54790279/54790279.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fb/8e/fb8e3638183a8e95ec7764a0b2a6408dd9d09795.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-01001-9_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Key-Recovery Attack on 855-round Trivium [chapter]

Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds.  ...  As far as we know, this is the best key-recovery attack on round-reduced Trivium. To verify our attack, we also give some experimental data on 721-round reduced Trivium.  ...  Acknowledgement The authors would like to thank anonymous reviewers for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_6">doi:10.1007/978-3-319-96881-0_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rv5bmf7akngrnmgv2oqy4rmbia">fatcat:rv5bmf7akngrnmgv2oqy4rmbia</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218143048/http://pdfs.semanticscholar.org/0e6f/2eda3a2176ea9c1eb6e05296c25069d88077.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/6f/0e6f2eda3a2176ea9c1eb6e05296c25069d88077.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96881-0_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly [chapter]

Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To be specific, our key recovery attacks have mounted to 839-round Trivium, 891-round Kreyvium, 184-round Grain-128a and 750-round Acorn respectively.  ...  The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especially for stream ciphers.  ...  We would like to thank Christian Rechberger, Elmar Tischhauser, Lorenzo Grassi and Liang Zhong for their fruitful discussions, and the anonymous reviewers for their valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_10">doi:10.1007/978-3-319-96884-1_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gmktfhmzkrhe3lkcrqc42mijy4">fatcat:gmktfhmzkrhe3lkcrqc42mijy4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190219045548/http://pdfs.semanticscholar.org/18d7/829b1e82c67d98696042865d00c159769d49.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/18/d7/18d7829b1e82c67d98696042865d00c159769d49.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-96884-1_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5jlmyrayyrdazh5awdlsoec77q" style="color: black;">IEEE transactions on computers</a> </i> &nbsp;
CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch cube attacks with cubes of dimensions far beyond  ...  In this paper, we further formulate the algebraic properties of the superpoly in one framework to facilitate cube attacks in more successful applications: we propose the "flag" technique to enhance the  ...  ACKNOWLEDGMENTS We would like to thank Christian Rechberger, Elmar Tischhauser, Lorenzo Grassi and Liang Zhong for their fruitful discussions, and the anonymous reviewers for their valuable comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2019.2909871">doi:10.1109/tc.2019.2909871</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yv3ayvuwszhp5oloxvdyauvumu">fatcat:yv3ayvuwszhp5oloxvdyauvumu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200506155549/https://orbilu.uni.lu/bitstream/10993/41328/1/main.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/a7/0aa79cc428be7c95971bd6019756bb5e2f54a281.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2019.2909871"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Truncated differential based known-key attacks on round-reduced SIMON

Yonglin Hao, Willi Meier
<span title="2016-06-28">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c45m6ttnaje4xbjsq7m2c6df2a" style="color: black;">Designs, Codes and Cryptography</a> </i> &nbsp;
With these techniques, we launch basic known-key attacks on round-reduced Simon. We also involve some key guessing technique and further extend the basic attacks to more rounds.  ...  Our known-key attacks can reach as many as 29/32/38/48/63-rounds of Simon32/48/64/96/128, which comes quite close to the full number of rounds.  ...  Dinur and Shamir have already used linear variables to nullify the crucial bits and successfully launched dynamic cube key recovery attacks on the stream cipher Grain-128 [42, 43] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-016-0242-3">doi:10.1007/s10623-016-0242-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bt4o5a7acjcujibz5u2aj4m3ye">fatcat:bt4o5a7acjcujibz5u2aj4m3ye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170716043618/https://eprint.iacr.org/2016/020.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/62/626260c94fc3631423905b0d8c753a01caf3ace0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10623-016-0242-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Fast Near Collision Attack on the Grain v1 Stream Cipher [chapter]

Bin Zhang, Chao Xu, Willi Meier
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Though a number of potential weaknesses have been identified, no key recovery attack on the original design in the single key model has been found yet.  ...  In this paper, we propose a key recovery attack, called near collision attack, on Grain v1.  ...  In this paper, we propose a new key recovery attack, called near collision attack, on Grain v1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78375-8_25">doi:10.1007/978-3-319-78375-8_25</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gfsytzxni5gmje6lfub5ahxbc4">fatcat:gfsytzxni5gmje6lfub5ahxbc4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709044457/https://www.iacr.org/archive/fse2013/84240483/84240483.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c7/5c/c75c52650bcca2b7230d53c51410b236abf9d4dc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-78375-8_25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks

Matthias Hamann, Matthias Krause
<span title="2018-05-08">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ifctadyxifgdperfzmc6v5tbu4" style="color: black;">Cryptography and Communications</a> </i> &nbsp;
Note that for the vast majority of known practical KSG-based stream ciphers such attacks reduce the effective key length to the birthday bound n/2, where n denotes the inner state length of the underlying  ...  The proposal is that for each packet i the packet initial state q i init is computed from the secret session key k and the packet initial value IV i via q i init = P (k ⊕IV i )⊕k, where P denotes a state  ...  attacks, fast correlation attacks, guess-and-verify attacks, BDD attacks, cube attacks etc.).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12095-018-0294-5">doi:10.1007/s12095-018-0294-5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/utew6dnihrhfrbdhk6b7g6supi">fatcat:utew6dnihrhfrbdhk6b7g6supi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170716145750/https://eprint.iacr.org/2015/636.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/73/aa/73aa80bebd74864d6d61862ac51b81203b569faf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12095-018-0294-5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,701 results