Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Yi Lu , Serge Vaudenay , Willi Meier , Liping Ding , Jianchun Jiang

ABSTRACT

It has been considered most important and difficult to analyze the bias and find a large bias regarding the security of crypto-systems, since the invention of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researchers often focus on a theoretical solution for a specific problem. In this paper, we take a first step towards the synthetic approach on bias analysis. We successfully apply our synthetic analysis to improve the most recent linear attacks on CubeHash and Rabbit respectively. CubeHash was selected to the second round of SHA-3 competition. For CubeHash, the best linear attack on 11-round CubeHash with 2470 queries was proposed previously. We present an improved attack for 11-round CubeHash with complexity 2414.2. Based on our 11-round attack, we give a new linear attack for 12-round CubeHash with complexity 2513, which is sharply close to the security parameter 2512 of CubeHash. Rabbit is a stream cipher among the finalists of ECRYPT Stream Cipher Project (eSTREAM). For Rabbit, the best linear attack with complexity 2141 was recently presented. Our synthetic bias analysis yields the improved attack with complexity 2136. Moreover, it seems that our results might be further improved, according to our ongoing computations. More... »

PAGES

248-260

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-31912-9_17

DOI

http://dx.doi.org/10.1007/978-3-642-31912-9_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026686964


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.458446.f", 
          "name": [
            "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lu", 
        "givenName": "Yi", 
        "id": "sg:person.010630432145.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010630432145.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "EPFL, Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5333.6", 
          "name": [
            "EPFL, Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "id": "sg:person.01353240467.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.458446.f", 
          "name": [
            "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ding", 
        "givenName": "Liping", 
        "id": "sg:person.014704227543.64", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014704227543.64"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.458446.f", 
          "name": [
            "National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jiang", 
        "givenName": "Jianchun", 
        "id": "sg:person.013616334145.16", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013616334145.16"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "It has been considered most important and difficult to analyze the bias and find a large bias regarding the security of crypto-systems, since the invention of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researchers often focus on a theoretical solution for a specific problem. In this paper, we take a first step towards the synthetic approach on bias analysis. We successfully apply our synthetic analysis to improve the most recent linear attacks on CubeHash and Rabbit respectively. CubeHash was selected to the second round of SHA-3 competition. For CubeHash, the best linear attack on 11-round CubeHash with 2470 queries was proposed previously. We present an improved attack for 11-round CubeHash with complexity 2414.2. Based on our 11-round attack, we give a new linear attack for 12-round CubeHash with complexity 2513, which is sharply close to the security parameter 2512 of CubeHash. Rabbit is a stream cipher among the finalists of ECRYPT Stream Cipher Project (eSTREAM). For Rabbit, the best linear attack with complexity 2141 was recently presented. Our synthetic bias analysis yields the improved attack with complexity 2136. Moreover, it seems that our results might be further improved, according to our ongoing computations.", 
    "editor": [
      {
        "familyName": "Kim", 
        "givenName": "Howon", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-31912-9_17", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-31911-2", 
        "978-3-642-31912-9"
      ], 
      "name": "Information Security and Cryptology - ICISC 2011", 
      "type": "Book"
    }, 
    "keywords": [
      "linear attack", 
      "improved attacks", 
      "ECRYPT Stream Cipher Project", 
      "ongoing computations", 
      "stream cipher", 
      "SHA-3 competition", 
      "attacks", 
      "Cipher Project", 
      "linear cryptanalysis", 
      "specific problems", 
      "CubeHash", 
      "queries", 
      "security", 
      "cryptanalysis", 
      "cipher", 
      "first step", 
      "computation", 
      "finalists", 
      "project", 
      "researchers", 
      "solution", 
      "step", 
      "synthetic analysis", 
      "theoretical solution", 
      "large bias", 
      "analysis", 
      "rounds", 
      "demonstration", 
      "invention", 
      "results", 
      "competition", 
      "target", 
      "second round", 
      "bias", 
      "bias analysis", 
      "synthetic approach", 
      "problem", 
      "paper", 
      "approach", 
      "rabbits", 
      "best linear attack", 
      "recent linear attacks", 
      "complexity 2414.2", 
      "new linear attack", 
      "complexity 2513", 
      "security parameter 2512", 
      "parameter 2512", 
      "Stream Cipher Project", 
      "complexity 2141", 
      "synthetic bias analysis", 
      "complexity 2136"
    ], 
    "name": "Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit", 
    "pagination": "248-260", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026686964"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-31912-9_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-31912-9_17", 
      "https://app.dimensions.ai/details/publication/pub.1026686964"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_172.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-31912-9_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31912-9_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31912-9_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31912-9_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-31912-9_17'


 

This table displays all metadata directly associated to this object as RDF triples.

145 TRIPLES      23 PREDICATES      77 URIs      70 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-31912-9_17 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N31d0e4b1753d433c9ba4cffa2e72d64f
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description It has been considered most important and difficult to analyze the bias and find a large bias regarding the security of crypto-systems, since the invention of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researchers often focus on a theoretical solution for a specific problem. In this paper, we take a first step towards the synthetic approach on bias analysis. We successfully apply our synthetic analysis to improve the most recent linear attacks on CubeHash and Rabbit respectively. CubeHash was selected to the second round of SHA-3 competition. For CubeHash, the best linear attack on 11-round CubeHash with 2470 queries was proposed previously. We present an improved attack for 11-round CubeHash with complexity 2414.2. Based on our 11-round attack, we give a new linear attack for 12-round CubeHash with complexity 2513, which is sharply close to the security parameter 2512 of CubeHash. Rabbit is a stream cipher among the finalists of ECRYPT Stream Cipher Project (eSTREAM). For Rabbit, the best linear attack with complexity 2141 was recently presented. Our synthetic bias analysis yields the improved attack with complexity 2136. Moreover, it seems that our results might be further improved, according to our ongoing computations.
7 schema:editor N9399054c3a40446794eb81975233c49b
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Ne46f88e1fc8140048329d049c6cdb57a
12 schema:keywords Cipher Project
13 CubeHash
14 ECRYPT Stream Cipher Project
15 SHA-3 competition
16 Stream Cipher Project
17 analysis
18 approach
19 attacks
20 best linear attack
21 bias
22 bias analysis
23 cipher
24 competition
25 complexity 2136
26 complexity 2141
27 complexity 2414.2
28 complexity 2513
29 computation
30 cryptanalysis
31 demonstration
32 finalists
33 first step
34 improved attacks
35 invention
36 large bias
37 linear attack
38 linear cryptanalysis
39 new linear attack
40 ongoing computations
41 paper
42 parameter 2512
43 problem
44 project
45 queries
46 rabbits
47 recent linear attacks
48 researchers
49 results
50 rounds
51 second round
52 security
53 security parameter 2512
54 solution
55 specific problems
56 step
57 stream cipher
58 synthetic analysis
59 synthetic approach
60 synthetic bias analysis
61 target
62 theoretical solution
63 schema:name Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
64 schema:pagination 248-260
65 schema:productId Ndc6cec9046574403a05739adf623ff19
66 Nf8d1728b65e049e3b334ff8cb18d9b97
67 schema:publisher N8af3cd8d68ac40329e1f4d01121543f0
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026686964
69 https://doi.org/10.1007/978-3-642-31912-9_17
70 schema:sdDatePublished 2022-01-01T19:10
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher N32e56cf17a13452f9e98c10173085fa3
73 schema:url https://doi.org/10.1007/978-3-642-31912-9_17
74 sgo:license sg:explorer/license/
75 sgo:sdDataset chapters
76 rdf:type schema:Chapter
77 N0dc4e2b257ce49e19a34d27620e319cc rdf:first sg:person.01353240467.39
78 rdf:rest N713321a9509c4d508110558034d0b6d9
79 N31d0e4b1753d433c9ba4cffa2e72d64f rdf:first sg:person.010630432145.10
80 rdf:rest N0dc4e2b257ce49e19a34d27620e319cc
81 N32e56cf17a13452f9e98c10173085fa3 schema:name Springer Nature - SN SciGraph project
82 rdf:type schema:Organization
83 N713321a9509c4d508110558034d0b6d9 rdf:first sg:person.07653531142.18
84 rdf:rest Na11129a85e8542c5bc5ae92779848c40
85 N8af3cd8d68ac40329e1f4d01121543f0 schema:name Springer Nature
86 rdf:type schema:Organisation
87 N9399054c3a40446794eb81975233c49b rdf:first Ndd7b61a719944af9ae73c142b93a44e1
88 rdf:rest rdf:nil
89 Na11129a85e8542c5bc5ae92779848c40 rdf:first sg:person.014704227543.64
90 rdf:rest Nc64a245c59ac4a12b48270b400ed09bd
91 Nc64a245c59ac4a12b48270b400ed09bd rdf:first sg:person.013616334145.16
92 rdf:rest rdf:nil
93 Ndc6cec9046574403a05739adf623ff19 schema:name doi
94 schema:value 10.1007/978-3-642-31912-9_17
95 rdf:type schema:PropertyValue
96 Ndd7b61a719944af9ae73c142b93a44e1 schema:familyName Kim
97 schema:givenName Howon
98 rdf:type schema:Person
99 Ne46f88e1fc8140048329d049c6cdb57a schema:isbn 978-3-642-31911-2
100 978-3-642-31912-9
101 schema:name Information Security and Cryptology - ICISC 2011
102 rdf:type schema:Book
103 Nf8d1728b65e049e3b334ff8cb18d9b97 schema:name dimensions_id
104 schema:value pub.1026686964
105 rdf:type schema:PropertyValue
106 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
107 schema:name Information and Computing Sciences
108 rdf:type schema:DefinedTerm
109 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
110 schema:name Data Format
111 rdf:type schema:DefinedTerm
112 sg:person.010630432145.10 schema:affiliation grid-institutes:grid.458446.f
113 schema:familyName Lu
114 schema:givenName Yi
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010630432145.10
116 rdf:type schema:Person
117 sg:person.01353240467.39 schema:affiliation grid-institutes:grid.5333.6
118 schema:familyName Vaudenay
119 schema:givenName Serge
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01353240467.39
121 rdf:type schema:Person
122 sg:person.013616334145.16 schema:affiliation grid-institutes:grid.458446.f
123 schema:familyName Jiang
124 schema:givenName Jianchun
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013616334145.16
126 rdf:type schema:Person
127 sg:person.014704227543.64 schema:affiliation grid-institutes:grid.458446.f
128 schema:familyName Ding
129 schema:givenName Liping
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014704227543.64
131 rdf:type schema:Person
132 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
133 schema:familyName Meier
134 schema:givenName Willi
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
136 rdf:type schema:Person
137 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
138 schema:name FHNW, Windisch, Switzerland
139 rdf:type schema:Organization
140 grid-institutes:grid.458446.f schema:alternateName National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China
141 schema:name National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing, China
142 rdf:type schema:Organization
143 grid-institutes:grid.5333.6 schema:alternateName EPFL, Lausanne, Switzerland
144 schema:name EPFL, Lausanne, Switzerland
145 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...