Cryptology ePrint Archive: Report 2015/1009
Applications of Key Recovery Cube-attack-like
Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny
Abstract: In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and authenticated encryption schemes. We also show that our key-recovery approach could be a framework for side-channel attacks, where the attacker has to deal with random errors in measurements.
Category / Keywords: secret-key cryptography / Cryptanalysis, Cube Attacks, Hash Functions, Authenticated Encryption, Side-channel Attacks
Date: received 16 Oct 2015
Contact author: pawel morawiecki at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20151019:205734 (All versions of this report)
Short URL: ia.cr/2015/1009
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]