Breaking the Estream Finalists and AES Modes of Operation Faster than Exhaustive Search
نویسندگان
چکیده
Time-memory-data (TMD) trade-off attack is a wellstudied technique that has been applied on many stream and block ciphers. Current TMD attacks by Biryukov-Shamir (BSTMD), Hong-Sarkar (HS-TMD) and Dunkelman-Keller (DKTMD) has been applied to ciphers like Grain-v1 and AES-192/256 modes of operation to break them with online complexity faster than exhaustive search. However, there is still a limitation because the precomputation is slower than exhaustive search for these attacks. In this paper, we introduce a new TMD attack that can break Estream ciphers and block cipher standards with both precomputation and online attack complexity faster than exhaustive search. The attack works whenever the IV length is shorter than the key length. Therefore, Estream ciphers like Grainv1, Rabbit, Salsa20, SOSEMANUK, MICKEY and block cipher standards like AES-192/256, KASUMI, IDEA, SAFER can all be broken. We also point out that our attack rely on less stringent requirements than known attacks on stream and block ciphers such as cube attack and related-key differential/boomerang attacks. Finally, we adapt our attack to the multi-user setting and show that the attack complexities can be reduced further. Zenner had proposed that stream ciphers should be designed with IV length equal to key length to resist TMD attacks in the multi-user setting. We show that this requirement is not sufficient for ciphers like Trivium, AES-128 and HC-128 where IV length equal key length can all be broken by our multi-user TMD attack. keywords: Stream Ciphers, Block Ciphers, Time-MemoryData Trade-Off Attack.
منابع مشابه
Design of a New Stream Cipher-LEX
In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.
متن کاملCache Timing Analysis of eStream Finalists
Cache Timing Attacks have attracted a lot of cryptographic attention due to their relevance for the AES. However, their applicability to other cryptographic primitives is less well researched. In this talk, we give an overview over our analysis of the stream ciphers that were selected for phase 3 of the eStream project.
متن کاملThe Salsa20 Family of Stream Ciphers
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications. The reduced-round ciphers Salsa20/12 and Salsa20/8 are ...
متن کاملHardware Evaluation of the AES Finalists
This report describes our evaluation results of implementing hardware of the AES finalists, concentrating on 128-bit key version, using Mitsubishi Electric’s 0.35 micron CMOS ASIC design library. Our goal is to estimate the “critical path length” of data encryption /decryption logic and key setup time of key scheduling logic for each algorithm, which corresponds to the fastest possible encrypti...
متن کاملCorrelated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different functional properties, compared to the other candidates. We present simple related-key phenomena in Moustique that lead to the generation of strongly correlated keystreams and to powerful key-recovery attacks. Our best k...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1207.0269 شماره
صفحات -
تاریخ انتشار 2012