Publication Type : Journal Article
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications
Source : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications, Volume 18, Number 3, p.301-311 (2015)
Keywords : Cryptography, Cube attacks, Geometry, Linearity test, Stream Ciphers, Superpoly, TRIVIUM
Campus : Coimbatore
School : School of Engineering, Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : Computer Science, cyber Security
Year : 2015
Abstract : Abstract: There have been various attempts to attack reduced variants of Trivium stream cipher using cube attack. During the preprocessing phase of cube attack, we need to test the linearity of a superpoly. The linearity testing problem is to check whether a function is close to linear by asking oracle queries to the function. This is the BLR linearity test for Boolean functions, which has a time complexity of O(22k + c) cipher operations, where k is the length of the key and c is the size of the cube. In this paper we present a method which is supposed to be a sufficient condition for testing a superpoly for linearity in Finf2/inf with a time complexity O(2c + 1 (k2 + k)). Our analysis on Trivium cipher reduced to 576 rounds using cube attack gives 69 extremely sparse linearly independent linear equations for smaller cubes, which recovers 69 bits of the key and reduces the attack complexity in the online phase to 211. © 2015, Taru Publications.
Cite this Research Publication : Dr. Srinivasan C., Pillai, U. U., K.V., L., and Dr. M. Sethumadhavan, “Cube Attack on Stream Ciphers using a Modified Linearity Test”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 18, pp. 301-311, 2015.