Improved division property based cube attacks exploiting algebraic properties of superpoly

Y Hao, T Isobe, L Jiao, C Li, W Meier… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the
division property based cube attack method making it possible to launch cube attacks with …

MILP-aided method of searching division property using three subsets and applications

S Wang, B Hu, J Guan, K Zhang, T Shi - … on the Theory and Application of …, 2019 - Springer
Division property is a generalized integral property proposed by Todo at EUROCRYPT
2015, and then conventional bit-based division property (CBDP) and bit-based division …

A practical key-recovery attack on 805-round trivium

CD Ye, T Tian - International Conference on the Theory and …, 2021 - Springer
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many
key-recovery attacks based on cube attacks have been established. However, few attacks …

Massive Superpoly Recovery with a Meet-in-the-Middle Framework: Improved Cube Attacks on Trivium and Kreyvium

J He, K Hu, H Lei, M Wang - … International Conference on the Theory and …, 2024 - Springer
The cube attack extracts the information of secret key bits by recovering the coefficient called
superpoly in the output bit with respect to a subset of plaintexts/IV, which is called a cube …

A key-recovery attack on 855-round Trivium

X Fu, X Wang, X Dong, W Meier - Annual International Cryptology …, 2018 - Springer
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the
output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the …

Revisit division property based cube attacks: key-recovery or distinguishing attacks?

CD Ye, T Tian - IACR Transactions on Symmetric Cryptology, 2019 - tosc.iacr.org
Cube attacks are an important type of key recovery attacks against stream ciphers. In
particular, they are shown to be powerful against Trivium-like ciphers. Traditional cube …

A new framework for finding nonlinear superpolies in cube attacks against trivium-like ciphers

C Ye, T Tian - Australasian Conference on Information Security and …, 2018 - Springer
In this paper, we focus on traditional cube attacks against Trivium-like ciphers in which linear
and nonlinear superpolies are experimentally tested. We provide a new framework on …

Improved cube attacks on some authenticated encryption ciphers and stream ciphers in the Internet of Things

Y He, G Wang, W Li, Y Ren - IEEE Access, 2020 - ieeexplore.ieee.org
With technical development and internet popularization, Internet of Things (IoT) technology
is gaining a wider application in various fields. Key challenges in the growth of IoT are …

Links between division property and other cube attack variants

Y Hao, L Jiao, C Li, W Meier, Y Todo… - IACR Transactions on …, 2020 - tosc.iacr.org
A theoretically reliable key-recovery attack should evaluate not only the non-randomness for
the correct key guess but also the randomness for the wrong ones as well. The former has …

New cube distinguishers on NFSR-based stream ciphers

A Kesarwani, D Roy, S Sarkar, W Meier - Designs, Codes and …, 2020 - Springer
In this paper, we revisit the work of Sarkar et al.(Des Codes Cryptogr 82 (1–2): 351–375,
2017) and Liu (Advances in cryptology—Crypto 2017, 2017) and show how both of their …