Back close

Cube Attack on Stream Ciphers using a Modified Linearity Test

Publication Type : Journal Article

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications

Source : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications, Volume 18, Number 3, p.301-311 (2015)

Url : http://www.scopus.com/inward/record.url?eid=2-s2.0-84930587648&partnerID=40&md5=0a0f6e212984239618256932adfa2c9a

Keywords : Cryptography, Cube attacks, Geometry, Linearity test, Stream Ciphers, Superpoly, TRIVIUM

Campus : Coimbatore

School : School of Engineering, Centre for Cybersecurity Systems and Networks

Center : TIFAC CORE in Cyber Security

Department : Computer Science, cyber Security

Year : 2015

Abstract : Abstract: There have been various attempts to attack reduced variants of Trivium stream cipher using cube attack. During the preprocessing phase of cube attack, we need to test the linearity of a superpoly. The linearity testing problem is to check whether a function is close to linear by asking oracle queries to the function. This is the BLR linearity test for Boolean functions, which has a time complexity of O(22k + c) cipher operations, where k is the length of the key and c is the size of the cube. In this paper we present a method which is supposed to be a sufficient condition for testing a superpoly for linearity in Finf2/inf with a time complexity O(2c + 1 (k2 + k)). Our analysis on Trivium cipher reduced to 576 rounds using cube attack gives 69 extremely sparse linearly independent linear equations for smaller cubes, which recovers 69 bits of the key and reduces the attack complexity in the online phase to 211. © 2015, Taru Publications.

Cite this Research Publication : Dr. Srinivasan C., Pillai, U. U., K.V., L., and Dr. M. Sethumadhavan, “Cube Attack on Stream Ciphers using a Modified Linearity Test”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, pp. 301-311, 2015.

Admissions Apply Now