Publication Type:

Journal Article

Source:

Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications, Volume 18, Number 3, p.301-311 (2015)

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-84930587648&partnerID=40&md5=0a0f6e212984239618256932adfa2c9a

Keywords:

Cryptography, Cube attacks, Geometry, Linearity test, Stream Ciphers, Superpoly, TRIVIUM

Abstract:

Abstract: There have been various attempts to attack reduced variants of Trivium stream cipher using cube attack. During the preprocessing phase of cube attack, we need to test the linearity of a superpoly. The linearity testing problem is to check whether a function is close to linear by asking oracle queries to the function. This is the BLR linearity test for Boolean functions, which has a time complexity of O(22k + c) cipher operations, where k is the length of the key and c is the size of the cube. In this paper we present a method which is supposed to be a sufficient condition for testing a superpoly for linearity in F<inf>2</inf> with a time complexity O(2c + 1 (k2 + k)). Our analysis on Trivium cipher reduced to 576 rounds using cube attack gives 69 extremely sparse linearly independent linear equations for smaller cubes, which recovers 69 bits of the key and reduces the attack complexity in the online phase to 211. © 2015, Taru Publications.

Notes:

cited By 0

Cite this Research Publication

C. Srinivasan, Pillai, U. U., Lakshmy, K. V., and M. Sethumadhavan, “Cube Attack on Stream Ciphers using a Modified Linearity Test”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, pp. 301-311, 2015.