Cryptanalysis of Hardware-Oriented Ciphers the Knapsack Generator, and SHA-1

نویسنده

  • Simon Knellwolf
چکیده

Symmetric key cryptographic algorithms provide confidentiality, integrity, and authentication in modern communication systems. Our confidence in these algorithms is largely based on the fact that intense cryptanalysis has been carried out over several years without revealing any weakness. This thesis makes three independent contributions to the cryptanalysis of symmetric key primitives and hash functions. First, conditional differential cryptanalysis is proposed as a general framework for the analysis of a large class of hardware-oriented ciphers that build on non-linear feedback shift registers. As main applications, various improved distinguishing and key recovery attacks on reduced-round variants of the stream ciphers Grain v1, Grain-128, Grain-128a, and Trivium are obtained. Second, the security of the knapsack generator, a stream cipher construction proposed by Rueppel and Massey in 1985, is studied. A surprisingly effective guess-and-determine attack is shown that recovers large parts of the n + n secret key bits if only n bits are known. Quite different from standard techniques of symmetric cryptanalysis, our approach uses Babai’s closest vertex algorithm and lattice reduction. Finally, meet-in-the-middle preimage attacks on hash functions are revisited. A new differential cryptanalytic perspective is proposed which is very suitable for hash functions with linear message expansion. As an application, previous preimage attacks against reduced variants of SHA-1 are significantly improved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Differential Cryptanalysis and Design of Natural Stream Ciphers

This paper introduces the differential cryptanalysis of additive stream ciphers, and develops its theoretical basis. The relationships between differential and other types of stream cipher analysis are presented. The conservation laws of patterns and of mutual information are derived. The cryptographic significance of pattern distribution of keystream sequences is shown. The cryptographic trans...

متن کامل

Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16

With growth of networked systems and applications such as ecommerce, the demand for internet security is increasing. Information can be secured using cryptography, anti-virus, malwares, spywares, firewall etc. In cryptology, cryptanalysis is a discipline where the ciphers are attacked and broke thus enabling the developers to strengthen the cipher. Nowadays cryptanalysis of ciphers is gaining p...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Cryptanalysis of Block Ciphers Based on SHA-1 and MD5

We cryptanalyse some block cipher proposals that are based on dedicated hash functions SHA-1 and MD5. We discuss a related-key attack against SHACAL-1 and present a method for finding “slid pairs” for it. We also present simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipher.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012