A Simpler Model for Recovering Superpoly on Trivium

نویسندگان

چکیده

The cube attack is a powerful cryptanalysis technique against symmetric primitives, especially for stream ciphers. One of the key step in recovering superpoly. division property has been introduced to attacks with aim first identify variables/monomials that are not involved Recently, some improved versions this allowing recovery exact superpoly have developed and applied on various ciphers [13, 15]. In paper, we propose new model recover cipher given cube. We polynomials as directed graph. It happens structure handles monomial cancellations more easily than those based property, leads better timing results. two implementations our model, one MILP CP, which up 10 times faster original property-based from Hao et al. [13], consistently 30 60 prediction-based Hu [15].

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cube Attacks on Trivium

This paper discusses the Cube attacks proposed in [1] applied to Trivium. Independent verification of the equations given in [1] were carried out. Experimentation showed that the precomputed equations were not general. They are correct when applied to the class of IVs for which they were computed where IV bits at locations other than those corresponding to the cube are fixed at 0. When these IV...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

A Probabilistic Model for Recovering Camera Translation

This paper describes the mathematical basis and application of a probabilistic model for recovering the direction of camera translation (heading) from optical flow. According to the theorem that heading cannot lie between two converging points in a stationary environment, one can compute the posterior probability distribution of heading across the image and choose the heading with maximum a pos...

متن کامل

Advanced Algebraic Attack on Trivium

This paper presents an algebraic attack against Trivium that breaks 625 rounds using only 4096 bits of output in an overall time complexity of 2 Trivium computations. While other attacks can do better in terms of rounds (799), this is a practical attack with a very low data usage (down from 2 output bits) and low computation time (down from 2). From another angle, our attack can be seen as a pr...

متن کامل

On the Design of Trivium

eSTREAM called for new stream ciphers designed for niche areas such as exceptional performance in software and hardware where resources are restricted. This project provides an open platform to discuss these ciphers. Trivium is one of the promising new ciphers submitted to it. Until now, no attack has been successfully applied to it. This paper illustrates new design principles of stream cipher...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-99277-4_13