Paper 2011/032

Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests

Piotr Mroczkowski and Janusz Szmidt

Abstract

In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers Trivium and Grain- 128, reduced variants of the block ciphers Serpent and CTC and to a reduced version of the keyed hash function MD6. Independently a very similar attack named AIDA was introduced by M. Vielhaber. In this paper we develop quadraticity tests within the cube attack and apply them to a variant of stream cipher Trivium reduced to 709 initialization rounds. Using this method we obtain the full 80-bit secret key. In this way it eliminates the stage of brute force search of some secret key bits which occured in previous cube attacks. In this corrigendum to our previous paper the indexing of cubes and key bits was reversed making it consistent with other papers.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
cube attackquadraticity tests
Contact author(s)
p mroczkowski @ wil waw pl
History
2011-01-19: received
Short URL
https://ia.cr/2011/032
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/032,
      author = {Piotr Mroczkowski and Janusz Szmidt},
      title = {Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/032},
      year = {2011},
      url = {https://eprint.iacr.org/2011/032}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.