Shamir’s “cube attack

Shamir’s “cube attack

ID:40402370

大小:83.76 KB

页数:5页

时间:2019-08-01

Shamir’s “cube attack_第1页
Shamir’s “cube attack_第2页
Shamir’s “cube attack_第3页
Shamir’s “cube attack_第4页
Shamir’s “cube attack_第5页
资源描述:

《Shamir’s “cube attack》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、Shamir’s“cubeattack”:ARemakeofAIDA,TheAlgebraicIVDifferentialAttackMichaelVielhaberHochschuleBremerhaven,FB2,AnderKarlstadt8,D–27568Bremerhaven,GermanyandInstitutodeMatem´aticas,UniversidadAustraldeChile,Casilla567,Valdivia,Chilevielhaber@gmail.com,23.02.2009Abstract.We

2、showthattheso-called“cubeattack”byDinurandShamirisnoth-ingbutarestatementoftheAlgebraicIVDifferentialAttackbythepresentauthor,publishedoneyearearlierinapaperknowntoDinurandShamir—astoutplagiarism.1IntroductionOnOctober28,2007theAlgebraicIVDifferentialAttack,orAIDAforshor

3、t,wasmadepublicontheIACReprintserveraseprint.iacr.org/2007/413,see[1].OnSeptember13,2008(afteratalkatCRYPTO’08inAugust2008—aplagiarismasIACRInvitedLecture!)DinurandShamirpostedthepaper“CubeAttacksonTweak-ableBlackBoxPolynomials”[2]onthesamemediumaseprint.iacr.org/2008/

4、385.Weshowherethatthetwoattacksareidentical,thatDinurandShamirmusthaveknownaboutthisidentity,andthat[2]onlygivessomeimplementationdetailsandcertaingeneralizations,somemoreuseful,somecertainlynot,butotherwisebuildsonAIDAexactlyasdescribedin[1],evenagainusingTriviumasthe

5、mainexample.2WhatisAIDA?Whensimulatingacryptographic(Boolean)function,weeffectivelyevaluateoneposi-tionofitstruthtable(orDNF,DisjunctiveNormalForm).Somecryptographicfunctions(forexampletheoutputofTriviumpriortoitsfullsetuplength,notvisibleinnormaloperation),haveasparsep

6、artinitsANF,AlgebraicNormalForm.Ifthispartturnsouttobelinearinthekeybits,itwillallowtocutinhalfthenecessarysearchspace,foreachsuchsparseequationfound.AIDAistheapplicationoftheInclusion-Exclusion-PrincipletoevaluatethissparseANFtermvia2

7、I

8、DNFevaluations,where

9、I

10、isthenum

11、berofbitsoftheinitialisationvector(IVbitsIVk,1≤k≤#IV),setinthesparseterm(constantkeyK):_^^M^f(IV1,..,IV#IV,K)=dI(K)IViIVi(DNF)=aI(K)IVi(ANF)I⊂{1,2,...,#IV}i∈Ii6∈II⊂{1,2,...,#IV}i∈IwithdI(K),aI(K)∈F2andaI(K)=⊕J⊂IdJ(K)bytheInclusion-Exclusion-Principle.13Arebothattackson

12、eandthesame?Theyareindeed,aswewillseestepbystep.SinceDinurandShamirreinventedeverypieceofnotation,althoughdescribingt

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。