Cryptology ePrint Archive: Report 2018/158

Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery

Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin

Abstract: In this paper, we describe a new variant of cube attacks called correlation cube attack. The new attack recovers the secret key of a cryptosystem by exploiting conditional correlation properties between the superpoly of a cube and a specific set of low-degree polynomials that we call a basis, which satisfies that the superpoly is a zero constant when all the polynomials in the basis are zeros. We present a detailed procedure of correlation cube attack for the general case, including how to find a basis of the superpoly of a given cube. One of the most significant advantages of this new analysis technique over other variants of cube attacks is that it converts from a weak-key distinguisher to a key recovery attack.

As an illustration, we apply the attack to round-reduced variants of the stream cipher Trivium. Based on the tool of numeric mapping introduced by Liu at CRYPTO 2017, we develop a specific technique to efficiently find a basis of the superpoly of a given cube as well as a large set of potentially good cubes used in the attack on Trivium variants, and further set up deterministic or probabilistic equations on the key bits according to the conditional correlation properties between the superpolys of the cubes and their bases. For a variant when the number of initialization rounds is reduced from 1152 to 805, we can recover about 7-bit key information on average with time complexity $2^{44}$, using $2^{45}$ keystream bits and preprocessing time $2^{51}$. For a variant of Trivium reduced to 835 rounds, we can recover about 5-bit key information on average with the same complexity. All the attacks are practical and fully verified by experiments. To the best of our knowledge, they are thus far the best known key recovery attacks for these variants of Trivium, and this is the first time that a weak-key distinguisher on Trivium stream cipher can be converted to a key recovery attack.

Category / Keywords: cryptanalysis, cube attack, stream cipher, Trivium

Original Publication (in the same form): IACR-EUROCRYPT-2018

Date: received 8 Feb 2018

Contact author: meicheng liu at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20180211:143509 (All versions of this report)

Short URL: ia.cr/2018/158

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]