Cryptology ePrint Archive: Report 2015/1009

Applications of Key Recovery Cube-attack-like

Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny

Abstract: In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and authenticated encryption schemes. We also show that our key-recovery approach could be a framework for side-channel attacks, where the attacker has to deal with random errors in measurements.

Category / Keywords: secret-key cryptography / Cryptanalysis, Cube Attacks, Hash Functions, Authenticated Encryption, Side-channel Attacks

Date: received 16 Oct 2015

Contact author: pawel morawiecki at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20151019:205734 (All versions of this report)

Short URL: ia.cr/2015/1009

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]