Degree evaluation of NFSR-based cryptosystems

M Liu - Annual International Cryptology Conference, 2017 - Springer
In this paper, we study the security of NFSR-based cryptosystems from the algebraic degree
point of view. We first present a general framework of iterative estimation of algebraic degree …

A practical key-recovery attack on 805-round trivium

CD Ye, T Tian - International Conference on the Theory and …, 2021 - Springer
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many
key-recovery attacks based on cube attacks have been established. However, few attacks …

Correlation cube attacks: From weak-key distinguisher to key recovery

M Liu, J Yang, W Wang, D Lin - … on the Theory and Applications of …, 2018 - Springer
In this paper, we describe a new variant of cube attacks called correlation cube attack. The
new attack recovers the secret key of a cryptosystem by exploiting conditional correlation …

A new framework for finding nonlinear superpolies in cube attacks against trivium-like ciphers

C Ye, T Tian - Australasian Conference on Information Security and …, 2018 - Springer
In this paper, we focus on traditional cube attacks against Trivium-like ciphers in which linear
and nonlinear superpolies are experimentally tested. We provide a new framework on …

Links between division property and other cube attack variants

Y Hao, L Jiao, C Li, W Meier, Y Todo… - IACR Transactions on …, 2020 - tosc.iacr.org
A theoretically reliable key-recovery attack should evaluate not only the non-randomness for
the correct key guess but also the randomness for the wrong ones as well. The former has …

New cube distinguishers on NFSR-based stream ciphers

A Kesarwani, D Roy, S Sarkar, W Meier - Designs, Codes and …, 2020 - Springer
In this paper, we revisit the work of Sarkar et al.(Des Codes Cryptogr 82 (1–2): 351–375,
2017) and Liu (Advances in cryptology—Crypto 2017, 2017) and show how both of their …

Fourteen years of cube attacks

M Cianfriglia, E Onofri, S Onofri, M Pedicini - Applicable Algebra in …, 2023 - Springer
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking
ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial …

Cube cryptanalysis of round-reduced ACORN

J Yang, M Liu, D Lin - International Conference on Information Security, 2019 - Springer
The cube attack is one of the most powerful techniques in cryptanalysis of symmetric
cryptographic primitives. The basic idea of cube attack is to determine the value of a …

Observing biases in the state: case studies with Trivium and Trivia-SC

S Sarkar, S Maitra, A Baksi - Designs, Codes and Cryptography, 2017 - Springer
One generic model of stream cipher considers updating the states and then combining the
state bits to produce the key-stream. In case there are biases in the state bits, that may be …

Improved greedy nonrandomness detectors for stream ciphers

L Karlsson, M Hell, P Stankovski - International Conference on …, 2017 - portal.research.lu.se
We consider the problem of designing distinguishers and nonrandomness detectors for
stream ciphers using the maximum degree monomial test. We construct an improved …