Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead

Y Hao, G Leander, W Meier, Y Todo… - Advances in Cryptology …, 2020 - Springer
A division property is a generic tool to search for integral distinguishers, and automatic tools
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …

Massive superpoly recovery with nested monomial predictions

K Hu, S Sun, Y Todo, M Wang, Q Wang - … on the Theory and Application of …, 2021 - Springer
Determining the exact algebraic structure or some partial information of the superpoly for a
given cube is a necessary step in the cube attack–a generic cryptanalytic technique for …

Stretching cube attacks: improved methods to recover massive superpolies

J He, K Hu, B Preneel, M Wang - … on the Theory and Application of …, 2022 - Springer
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special
polynomial, the superpoly, and subsequently the secret key. When the algebraic normal …

Trivial transciphering with Trivium and TFHE

T Balenbois, JB Orfila, N Smart - Proceedings of the 11th Workshop on …, 2023 - dl.acm.org
We examine the use of Trivium and Kreyvium as transciphering mechanisms for use with the
TFHE FHE scheme. Trivium was introduced in the eSTREAM project as a general purpose …

Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium

J He, K Hu, H Lei, M Wang - … International Conference on the Theory and …, 2024 - Springer
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …

Modeling for three-subset division property without unknown subset

Y Hao, G Leander, W Meier, Y Todo, Q Wang - Journal of Cryptology, 2021 - Springer
A division property is a generic tool to search for integral distinguishers, and automatic tools
such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application …

From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers

J Lin, J He, Y Fan, M Wang - International Conference on Cryptology in …, 2023 - Springer
Low energy is an important aspect of hardware implementation. For energy-limited battery-
powered devices, low energy stream ciphers can play an important role. In IACR ToSC …

Fourteen years of cube attacks

M Cianfriglia, E Onofri, S Onofri, M Pedicini - Applicable Algebra in …, 2023 - Springer
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …

Dynamic Cube Attacks against Grain-128AEAD

C Liu, T Tian - IACR Transactions on Symmetric Cryptology, 2024 - tosc.iacr.org
In this paper, we revisit the division property based dynamic cube attack on the full Grain-
128 presented by Hao et al. at FSE 2020 and demonstrate that their attack on the full Grain …

流密码分析方法研究综述

周照存, 冯登国 - 通信学报, 2022 - infocomm-journal.com
研究密码分析方法对设计密码算法至关重要. 鉴于此, 回顾了目前主要的流密码分析方法,
研究了流密码分析方法的分类与联系, 从主要技术特点的角度将其分为基于相关性质, 差分性质 …