Abstract
AbstractAlgebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the cube attack, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on cubes in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the kite attack framework, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.
Funder
Università degli Studi Roma Tre
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference124 articles.
1. Abdul-Latip, S.F., Reyhanitabar, M., Susilo, W., Seberry, J.: Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 296–305 (2011). https://doi.org/10.1145/1966913.1966952
2. Abdul-Latip, S.F., Reyhanitabar, M.R., Susilo, W., Seberry, J.: On the security of NOEKEON against side channel cube attacks. Inf. Secur. Pract. Exp. (2010). https://doi.org/10.1007/978-3-642-12827-1_4
3. Agnesse, A., Pedicini, M.: Cube attack in finite fields of higher order. CRPIT 116, 9–14 (2011)
4. Ahmadian, Z., Rasoolzadeh, S., Salmasizadeh, M., Aref, M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN. Cryptology ePrint Archive, Paper 2015/040 (2015). https://eprint.iacr.org/2015/040
5. Armknecht, F., Ars, G.: Algebraic attacks on stream ciphers with Gröbner bases. In: Gröbner Bases, Coding, and Cryptography, pp. 329–348. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-93806-4_18
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium;Finite Fields and Their Applications;2024-09
2. Cube Attacks on Round-Reduced Grain-128AEAD;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023-12-20