Paper 2010/570
Breaking Grain-128 with Dynamic Cube Attacks
Itai Dinur and Adi Shamir
Abstract
We present a new variant of cube attacks called a \emph{dynamic cube
attack}. Whereas standard cube attacks \cite{4} find the key by
solving a system of linear equations in the key bits, the new attack
recovers the secret key by exploiting distinguishers obtained from
cube testers. Dynamic cube attacks can create lower degree
representations of the given cipher, which makes it possible to
attack schemes that resist all previously known attacks. In this
paper we concentrate on the well-known stream cipher Grain-128
\cite{6}, on which the best known key recovery attack \cite{15} can
recover only
Note: Updated according to comments by anonymous referees
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Appears in FSE 2011
- Keywords
- Cryptanalysisstream ciphersGrain-128cube attackscube testersdynamic cube attacks
- Contact author(s)
- itai dinur @ weizmann ac il
- History
- 2011-03-20: last of 2 revisions
- 2010-11-09: received
- See all versions
- Short URL
- https://ia.cr/2010/570
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/570, author = {Itai Dinur and Adi Shamir}, title = {Breaking Grain-128 with Dynamic Cube Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/570}, year = {2010}, url = {https://eprint.iacr.org/2010/570} }