سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Publish Year: 1399
Type: Journal paper
Language: English
View: 300

This Paper With 15 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

JR_JCSE-7-2_003

Index date: 6 February 2021

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis abstract

In this paper, we propose a new method to launch a more efficient algebraic cryptanalysis. Algebraic cryptanalysis aims at finding the secret key of a cipher by solving a collection of polynomial equations that describe the internal structure of the cipher. Chosen correlated plaintexts, as what appears in higher order differential cryptanalysis and its derivatives such as cube attack or integral cryptanalysis, forces many linear relations between intermediate state bits in the cipher. In this paper, we take these polynomial relations into account, so it becomes possible to simplify the equation system arising from algebraic cryptanalysis, and consequently, solve the polynomial system more efficiently.We take advantage of the Universal Proning technique to provide an efficient method to recover such linear polynomials. Another important parameter in the algebraic cryptanalysis of ciphers is to effectively describe the cipher. We employ the so-called Forward-Backward representation of S-boxes together with Universal Proning to help provide a more powerful algebraic cryptanalysis based on Gröbner-basis computation. We show our method is more efficient than doing algebraic cryptanalysis with MQ representation, and also than employing MQ together with Universal Proning. To show the effectiveness of our approach, we applied it for the cryptanalysis of several lightweight block ciphers. By this approach, we managed to mount algebraic attack on 12-round LBlock, 6-round MIBS, 7-round PRESENT and 9-round SKINNY light-weight block ciphers, so far.

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis Keywords:

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis authors

Hossein Arabnezhad

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran.

Babak Sadeghian

Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
J. Faugere and L. Perret. Improving the recognition of faces occluded by ...
G. V. Bard, N. T. Courtois, J. Nakahara, P. Sepehrdad, and B. Zhang. Improving the ...
P. Sušilα, P. Sepehrdad, and S. Vaudenay. On Selection of Samples in Algebraic ...
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of ...
L. Knudsen and D. Wagner. Integral cryptanalysis. In International Workshop on Fast ...
Y. Todo. Structural evaluation by generalized integral property. In Annual International ...
M. Izadi, B. Sadeghiyan, S. S. Sadeghian, and H. A. Khanooki. Structural evaluation by ...
M. Wang. Structural evaluation by generalized integral property. In International Conference ...
S. Wu and M. Wang. Integral attacks on reduced-round PRESENT. In International ...
M. R. Z'aba, H. Raddum, M. Henricksen, and E. Dawson. Bit-pattern based integral attack. ...
B. Collard and F. X. Standaert. A statistical saturation attack against the ...
M. Albrecht and C. Cid. Algebraic techniques in differential cryptanalysis. In International ...
S. Wu and M. Wang. Automatic search of truncated impossible differentials for ...
A. Bay, J. Nakahara, and S. Vaudenay. Cryptanalysis of reduced-round MIBS block cipher. ...
Y. Sasaki and L. Wang. Comprehensive study of integral analysis on 22-round ...
N. T. Courtois, P. Sepehrdad, P. Sušil, and S. Vaudenay. ElimLin algorithm revisited. In ...
Z. Eskandari, A. B. Kidmose, S. Kölbl, and T. Tiessen. Finding Integral Distinguishers with ...
M. Albrecht and G. Bard. The M4RI Library -- Version 20140914. The ...
M. Brickenstein and A. Dreyer. Polybori: A framework for gröbner-basis computations with ...
S. Islam, M. Afzal, and A. Rashdi. On the security of LBlock against ...
A. Biryukov and C. D. Cannière. Block Ciphers and Systems of Quadratic ...
J. N. Jr, P. Sepehrdad, B. Zhang, and M. Wang. Linear (hull) and algebraic ...
N. T. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined ...
J. L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In International ...
J. Faugere and L. Perret. The cipher SHARK. In International Workshop on ...
J. Daemen, L. Knudsen, and V. Rijmen. The block cipher Square. In International ...
X. Lai. Higher order derivatives and differential cryptanalysis. In Communications and ...
C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, and S. M. ...
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin, and ...
J. Faugere and L. Perret. LBlock: a lightweight block cipher. In International ...
P. SUŠIL. Algebraic Cryptanalysis of Deterministic Symmetric Encryption. [ bib | .pdf ] ...
S. Abdul-Latip, M. R. Reyhanitabar, W. Susilo, and J. Seberry. Extended cubes: enhancing the ...
M. Blum, M. Luby, and R. Rubinfeld. Self-testing/correcting with applications to numerical problems. ...
I. Dinur and A. Shamir. Annual International Conference on the Theory and ...
H. Arabnezhad-Khanoki, B. Sadeghiyan, and J. Pieprzyk. S-boxes representation and efficiency of algebraic ...
A. Flórez-Gutiérrez and M. Naya-Plasencia. Improving Key-Recovery in Linear Attacks: Application to ...
S. Sadeghi, T. Mohammadi, and N. Bagheri. Cryptanalysis of reduced round SKINNY block ...
نمایش کامل مراجع