搜索结果: 1-15 共查到“军事学 Cube Attack”相关记录24条 . 查询时间(0.046 秒)
Conditional cube attack on round-reduced \textsc{Keccak} keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was si...
Cube attack is an important cryptanalytic technique against symmetric cryptosystems, especially for stream ciphers. The key step in cube attack is recovering superpoly. However, when cube size is larg...
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Frit Duplex authenticated encryption mode Key-dependent cube attack
2019/2/25
Frit is a new lightweight 384-bit cryptographic permutation proposed by Simon et al., which is designed for resisting fault injection and performs competitively in both hardware and software. Dobrauni...
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ketje Xoodoo Keccak-MAC
2018/11/19
Cube-attack-like cryptanalysis on round-reduced Keccak was proposed by Dinur et al. at EUROCRYPT 2015. It recovers the key through two phases: the preprocessing phase for precomputing a look-up table ...
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18
Dynamic Cube attack Division Property MILP
2018/11/6
Recently, another kind of dynamic cube attack is proposed by Fu et al. With some key guesses and a transformation in the output bit, they claim that, when the key guesses are correct, the degree of th...
Satisfiability modulo theories or SMT can be stated as a generalization of Boolean satisfiability problem or SAT. The core idea behind the introduction of SMT solvers is to reduce the complexity throu...
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack, one selects cube variables ...
This note analyzes the security of Kravatte against the cube attack. We provide an analysis result which recovers the master key of the current version of full Kravatte with data and time complexities...
Conditional Cube Attack on Round-Reduced River Keyak
secret-key encryption round-reduced River Keyak
2017/10/19
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak is the only lightweight scheme of the Keccak-permutation-based Authenticated Encryption Cipher Keya...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cu...
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Keccak-MAC Keyak cube tester
2016/12/10
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable...
A Dynamic Cube Attack on $105$ round Grain v1
eStream Differential Cryptanalysis Dynamic Cube Attack
2016/1/7
As far as the Differential Cryptanalysis of reduced round Grain
v1 is concerned, the best results were those published by Knellwolf et al. in
Asiacrypt 2011. In an extended version of the paper, it ...
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Keccak SHA-3 sponge function
2016/1/7
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of ...
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
block cipher cryptanalysis cube attack
2016/1/4
A little work has ever been performed in cryptanalysis of
block ciphers using cube technique. This paper presents a new framework
for an efficient key recovery attack on block ciphers using a kind o...
In this paper, we describe a variant of the cube attack with much better-understood
Preprocessing Phase, where complexity can be calculated without running the actual experiments
and random-like sea...