论文标题

相关立方体攻击重新审视:改进的立方体搜索和超级恢复技术

Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques

论文作者

Wang, Jianhua, Qin, Lu, Wu, Baofeng

论文摘要

在本文中,我们通过利用SuperPoly W.R.T.的低度因素来改善立方体攻击。某些“特殊”索引集(ISOC)。这可以看作是在2018年Eurocrypt提出的相关立方体攻击的一种特殊情况,但是在我们的框架下,可以在关键变量上获得更有益的方程式。为了实现我们的攻击,一个有两个具有挑战性的问题:有效地恢复超级物质的代数正常形式,并提取其低度因素;并有效地搜索大量良好的ISOC。我们引入了新技术来解决这两种技术。首先,我们提出了对密码中间回合的可变替代技术,其中内部状态代数表达式中的密钥变量上的多项式被新变量替代。这将改善超级恢复的计算复杂性,并承诺更紧凑的超级胶体,这些超级胶体可以很容易地相对于新变量进行分解。其次,我们提出了矢量数字映射技术,该技术在数字映射技术的效率与单次预测技术的准确性之间寻求权衡,以评估超级胶体。结合该技术,通过MILP给出并建模一种快速修剪方法,以过滤良好的ISOC,代数程度满足某些固定阈值。多亏了自动化量的MILP求解器,可以在整个搜索空间中全面搜索好立方体。为了说明我们的技术的力量,我们将它们全部应用于Trivium Stream Cipher。以前的最佳实际钥匙恢复攻击是对820轮的琐事,复杂性$ 2^{53.17} $。我们提出了820-,825和830轮实用的键恢复攻击,其中有2^{80} \ times 87.8%,2^{80} \ times 83%和2^{80} \ times 65.7%的钥匙,可以分别恢复。

In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. certain "special" index set of cube (ISoC). This can be viewed as a special case of the correlation cube attack proposed at Eurocrypt 2018, but under our framework more beneficial equations on the key variables can be obtained in the key-recovery phase. To mount our attack, one has two challenging problems: effectively recover algebraic normal form of the superpoly and extract out its low-degree factors; and efficiently search a large quantity of good ISoCs. We bring in new techniques to solve both of them. First, we propose the variable substitution technique for middle rounds of a cipher, in which polynomials on the key variables in the algebraic expressions of internal states are substituted by new variables. This will improve computational complexity of the superpoly recovery and promise more compact superpolys that can be easily decomposed with respect to the new variables. Second, we propose the vector numeric mapping technique, which seeks out a tradeoff between efficiency of the numeric mapping technique and accuracy of the monomial prediction technique in degree evaluation of superpolys. Combining with this technique, a fast pruning method is given and modeled by MILP to filter good ISoCs of which the algebraic degree satisfies some fixed threshold. Thanks to automated MILP solvers, it becomes practical to comprehensively search for good cubes across the entire search space. To illustrate the power of our techniques, we apply all of them to Trivium stream cipher. The previous best practical key recovery attack was on 820-round Trivium with complexity $2^{53.17}$. We put forward 820-, 825- and 830-round practical key-recovery attacks, in which there are 2^{80}\times 87.8%, 2^{80}\times 83% and 2^{80}\times 65.7% keys that could be practically recovered, respectively.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源