Skip to main content

Comparison of Cube Attacks Over Different Vector Spaces

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9496))

Abstract

We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a more general higher order differentiation attack, by summing over an arbitrary subspace of the space of initialisation vectors. The Moebius transform can be used for efficiently examining all the subspaces of a big space, similar to the method used by Fouque and Vannet for the usual cube attack.

Secondly we propose replacing the Generalised Linearity Test proposed by Dinur and Shamir with a test based on higher order differentiation/Moebius transform. We show that the proposed test provides all the information provided by the Generalised Linearity Test, at the same computational cost. In addition, for functions that do not pass the linearity test it also provides, at no extra cost, an estimate of the degree of the function. This is useful for guiding the heuristics for the cube/AIDA attacks.

Finally we implement our ideas and test them on the stream cipher Trivium.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. De Cannière, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Das, S., Maitra, S., Meier, W.: Higher order differential analysis of NORX. IACR Cryptology ePrint Arch. 2015, 186 (2015)

    Google Scholar 

  3. Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  4. Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Crypt. Commun. 4(3–4), 217–232 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. Duan, M., Lai, X.: Higher order differential cryptanalysis framework and its applications. In: International Conference on Information Science and Technology (ICIST), pp. 291–297 (2011)

    Google Scholar 

  6. Fouque, P.-A., Vannet, T.: Improving key recovery to 784 and 799 rounds of trivium using optimized cube attacks. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 502–517. Springer, Heidelberg (2014)

    Google Scholar 

  7. Fouque, P.-A., Vannet, T.: Improving key recovery to 784 and 799 rounds of trivium using optimized cube attacks. IACR Cryptology ePrint Arch. 2015, 312 (2015)

    MATH  Google Scholar 

  8. Joux, A.: Algorithmic Cryptanalysis, 1st edn. Chapman and Hall/CRC, Boca Raton (2009)

    Book  MATH  Google Scholar 

  9. Knellwolf, S., Meier, W.: High order differential attacks on stream ciphers. Crypt. Commun. 4(3–4), 203–215 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello Jr., D.J., Maurer, U., Mittelholzer, T. (eds.) Communications and Cryptography. The Springer International Series in Engineering and Computer Science, vol. 276, pp. 227–233. Springer, US (1994)

    Chapter  Google Scholar 

  11. Vielhaber, M.: Breaking ONE.FIVIUM by AIDA an algebraic IV differential attack. Cryptology ePrint Archive, Report 2007/413 (2007). http://eprint.iacr.org/

Download references

Acknowledgements

The authors would like to thank the referees for useful comments. One of the referees brought to our attention the recent paper [2] that we had not been aware of, and in which higher order derivatives with respect to an arbitrary vector space (as explored in Sect. 3) were used for statistical attacks on the NORX cipher.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Winter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Winter, R., Salagean, A., Phan, R.CW. (2015). Comparison of Cube Attacks Over Different Vector Spaces. In: Groth, J. (eds) Cryptography and Coding. IMACC 2015. Lecture Notes in Computer Science(), vol 9496. Springer, Cham. https://doi.org/10.1007/978-3-319-27239-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27239-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27238-2

  • Online ISBN: 978-3-319-27239-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics