Breaking Grain-128 with Dynamic Cube Attacks
From MaRDI portal
Publication:3013083
DOI10.1007/978-3-642-21702-9_10zbMath1282.94042OpenAlexW97949831MaRDI QIDQ3013083
Publication date: 7 July 2011
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_10
Related Items (29)
Conditional differential cryptanalysis of 105 round Grain v1 ⋮ Improving Division Property Based Cube Attacks by Removing Invalid Monomials ⋮ Conditional Differential Cryptanalysis of Trivium and KATAN ⋮ Deciding EA-equivalence via invariants ⋮ High order differential attacks on stream ciphers ⋮ Quark: a lightweight hash ⋮ Grain-128AEADv2: strengthening the initialization against key reconstruction ⋮ Correlation cube attacks: from weak-key distinguisher to key recovery ⋮ Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks ⋮ Near Collision Attack on the Grain v1 Stream Cipher ⋮ Meet-in-the-middle preimage attacks on sponge-based hashing ⋮ Triplicate functions ⋮ Conditional Cube Searching and Applications on Trivium-Variant Ciphers ⋮ On the image of an affine subspace under the inverse function within a finite field ⋮ Quantum security of grain-128/grain-128a stream cipher against HHL algorithm ⋮ A practical key-recovery attack on 805-round Trivium ⋮ A polynomial system for bit-based division property solving by quantum algorithm ⋮ Finding integral distinguishers with ease ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Fault Analysis of Grain-128 by Targeting NFSR ⋮ An improved degree evaluation method of NFSR-based cryptosystems ⋮ Conditional cube attack on round-reduced River Keyak ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ Conditional Cube Attack on Reduced-Round Keccak Sponge Function ⋮ Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC ⋮ Another View of the Division Property ⋮ New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions ⋮ Algebraic attacks on grain-like keystream generators ⋮ TNT: how to tweak a block cipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
- Greedy Distinguishers and Nonrandomness Detectors
- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
- Analysis of Grain’s Initialization Algorithm
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
- Cube Attacks on Tweakable Black Box Polynomials
- Higher Order Derivatives and Differential Cryptanalysis
- Algorithmic Cryptanalysis
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
This page was built for publication: Breaking Grain-128 with Dynamic Cube Attacks