CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2). This paper applies cube attacks to reduced round MD6, finding the full 128-bit key of a 14-round MD6 with complexity 2^22 (which takes less than a minute on a single PC). This is the best key recovery attack announced so far for MD6. We then introduce a new class of attacks called cube testers, based on efficient property-testing algorithms, and apply them to MD6 and to the stream cipher Trivium. Unlike the standard cube attacks, cube testers detect nonrandom behavior rather than performing key extraction, but they can also attack cryptographic s...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic a...
The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciph...
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. c...
International audienceDinur and Shamir have described cube attacks at EUROCRYPT '09 and they have sh...
The cube attack is one of the most important cryptanalytic techniques against Trivium. Many improvem...
Abstract. Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), whi...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, th...
Cube attack is one powerful method in the cryptanalysis of NFSR-based ciphers. In this paper, we pro...
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomia...
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referrin...
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especia...
Abstract. Cube attacks can be used to analyse and break cryptographic primitives that have an easy a...
In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadrat...