Abstract

Cube attack has been proposed by Dinur and Shamir in 2009. It is an addition in the area of cryptanalysis applicable to a wide range of symmetric key algorithms. Cryptographic schemes may be represented by tweakable polynomials in GF(2) in terms of secret and public variables. Cube attack is a major improvement over existing techniques used for solving such polynomial equations. In this research, stream ciphers Trivium and A5/1 have been analyzed against the cube attack. 69 out of 80 key bits for 576 round Trivium have been successfully recovered with a complexity of 212, 63 cipher evaluations. 20 linearly independent relations have been found for 5 round A5/1 with the attack complexity of 244 cipher iterations. Cube attack software toolkit from our previous research has been utilized for cube cryptanalysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call