A New Practical Cube Attack via Recovering Numerous Superpolys

Cube attack is one of the most powerful approaches for recovering keys of stream ciphers. Practical cube attacks generate several superpolys first and solve the system constructed by these superpolys afterward. Unlike previous practical attacks, we propose a new cube attack that transfers the diffi...

Full description

Saved in:
Bibliographic Details
Main Authors: Min Zhang, Yao Sun
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2024-12-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tches.iacr.org/index.php/ToSC/article/view/11950
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846116517498847232
author Min Zhang
Yao Sun
author_facet Min Zhang
Yao Sun
author_sort Min Zhang
collection DOAJ
description Cube attack is one of the most powerful approaches for recovering keys of stream ciphers. Practical cube attacks generate several superpolys first and solve the system constructed by these superpolys afterward. Unlike previous practical attacks, we propose a new cube attack that transfers the difficulty of generating easy-solving superpolys to solving the system built by numerous nonlinear ones. In the offline phase, we recovered lots of nonlinear superpolys by improving the approach proposed by Delaune et al. at SAC 2022 in theory. In the online phase, taking advantage of the sparsity and asymmetry of these numerous superpolys, we present a new testing method to solve the constructed system efficiently. As applications, the latest attack could practically recover the keys for 820- and 832-round Trivium with the time complexity no more extensive than 246 and 250, while the previous highest number of rounds of Trivium that can be attacked practically is 830. We believe the proposed approach can be used to attack more rounds of Trivium and other stream ciphers.
format Article
id doaj-art-49c7cf6d96964020a2fd583e3d938a00
institution Kabale University
issn 2519-173X
language English
publishDate 2024-12-01
publisher Ruhr-Universität Bochum
record_format Article
series IACR Transactions on Symmetric Cryptology
spelling doaj-art-49c7cf6d96964020a2fd583e3d938a002024-12-18T16:49:37ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2024-12-012024410.46586/tosc.v2024.i4.38-63A New Practical Cube Attack via Recovering Numerous SuperpolysMin Zhang0Yao Sun1Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, ChinaKey Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China Cube attack is one of the most powerful approaches for recovering keys of stream ciphers. Practical cube attacks generate several superpolys first and solve the system constructed by these superpolys afterward. Unlike previous practical attacks, we propose a new cube attack that transfers the difficulty of generating easy-solving superpolys to solving the system built by numerous nonlinear ones. In the offline phase, we recovered lots of nonlinear superpolys by improving the approach proposed by Delaune et al. at SAC 2022 in theory. In the online phase, taking advantage of the sparsity and asymmetry of these numerous superpolys, we present a new testing method to solve the constructed system efficiently. As applications, the latest attack could practically recover the keys for 820- and 832-round Trivium with the time complexity no more extensive than 246 and 250, while the previous highest number of rounds of Trivium that can be attacked practically is 830. We believe the proposed approach can be used to attack more rounds of Trivium and other stream ciphers. https://tches.iacr.org/index.php/ToSC/article/view/11950Practical cube attackStream ciphersTriviumSolving nonlinear polynomial systems
spellingShingle Min Zhang
Yao Sun
A New Practical Cube Attack via Recovering Numerous Superpolys
IACR Transactions on Symmetric Cryptology
Practical cube attack
Stream ciphers
Trivium
Solving nonlinear polynomial systems
title A New Practical Cube Attack via Recovering Numerous Superpolys
title_full A New Practical Cube Attack via Recovering Numerous Superpolys
title_fullStr A New Practical Cube Attack via Recovering Numerous Superpolys
title_full_unstemmed A New Practical Cube Attack via Recovering Numerous Superpolys
title_short A New Practical Cube Attack via Recovering Numerous Superpolys
title_sort new practical cube attack via recovering numerous superpolys
topic Practical cube attack
Stream ciphers
Trivium
Solving nonlinear polynomial systems
url https://tches.iacr.org/index.php/ToSC/article/view/11950
work_keys_str_mv AT minzhang anewpracticalcubeattackviarecoveringnumeroussuperpolys
AT yaosun anewpracticalcubeattackviarecoveringnumeroussuperpolys
AT minzhang newpracticalcubeattackviarecoveringnumeroussuperpolys
AT yaosun newpracticalcubeattackviarecoveringnumeroussuperpolys