Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations

In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadratic ones) in addi- tion to the linear ones, obtainable from the original cube attack by Dinur and Shamir at EUROCRYPT 2009. This extended cube attack can be successfully applied even to cryptosyste...

Full description

Saved in:
Bibliographic Details
Main Authors: Abdul-Latip, S. F., Reyhanitabar, M. R., Susilo, W., Seberry, J.
Format: Conference or Workshop Item
Language:English
Published: ACM 2011
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/84/1/ASIACCS_2011.pdf
http://eprints.utem.edu.my/id/eprint/84/
http://doi.acm.org/10.1145/1966913.1966952
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English
id my.utem.eprints.84
record_format eprints
spelling my.utem.eprints.842015-05-28T02:16:41Z http://eprints.utem.edu.my/id/eprint/84/ Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations Abdul-Latip, S. F. Reyhanitabar, M. R. Susilo, W. Seberry, J. QA75 Electronic computers. Computer science In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadratic ones) in addi- tion to the linear ones, obtainable from the original cube attack by Dinur and Shamir at EUROCRYPT 2009. This extended cube attack can be successfully applied even to cryptosystems in which the original cube attack may fail due to the attacker's inability in nding suciently many inde- pendent linear equations. As an application of our extended method, we exhibit a side channel cube attack against the PRESENT block cipher using the Hamming weight leakage model. Our side channel attack improves upon the previ- ous work of Yang, Wang and Qiao at CANS 2009 from two aspects. First, we use the Hamming weight leakage mod- el which is a more relaxed leakage assumption, supported by many previously known practical results on side channel attacks, compared to the more challenging leakage assump- tion that the adversary has access to the \exact" value of the internal state bits as used by Yang et al. Thanks to applying the extended cube method, our attack has also a reduced complexity compared to that of Yang et al. Name- ly, for PRESENT-80 (80-bit key variant) as considered by Yang et al., our attack has a time complexity 2^16 and data complexity of about 2^13 chosen plaintexts; whereas, that of Yang et al. has time complexity of 2^32 and needs about 2^15 chosen plaintexts. Furthermore, our method directly applies to PRESENT-128 (i.e. 128-bit key variant) with time com- plexity of 2^64 and the same data complexity of 2^13 chosen plaintexts. ACM 2011 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/84/1/ASIACCS_2011.pdf Abdul-Latip, S. F. and Reyhanitabar, M. R. and Susilo, W. and Seberry, J. (2011) Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. http://doi.acm.org/10.1145/1966913.1966952
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
description In this paper, we propose an ecient method for extracting simple low-degree equations (e.g. quadratic ones) in addi- tion to the linear ones, obtainable from the original cube attack by Dinur and Shamir at EUROCRYPT 2009. This extended cube attack can be successfully applied even to cryptosystems in which the original cube attack may fail due to the attacker's inability in nding suciently many inde- pendent linear equations. As an application of our extended method, we exhibit a side channel cube attack against the PRESENT block cipher using the Hamming weight leakage model. Our side channel attack improves upon the previ- ous work of Yang, Wang and Qiao at CANS 2009 from two aspects. First, we use the Hamming weight leakage mod- el which is a more relaxed leakage assumption, supported by many previously known practical results on side channel attacks, compared to the more challenging leakage assump- tion that the adversary has access to the \exact" value of the internal state bits as used by Yang et al. Thanks to applying the extended cube method, our attack has also a reduced complexity compared to that of Yang et al. Name- ly, for PRESENT-80 (80-bit key variant) as considered by Yang et al., our attack has a time complexity 2^16 and data complexity of about 2^13 chosen plaintexts; whereas, that of Yang et al. has time complexity of 2^32 and needs about 2^15 chosen plaintexts. Furthermore, our method directly applies to PRESENT-128 (i.e. 128-bit key variant) with time com- plexity of 2^64 and the same data complexity of 2^13 chosen plaintexts.
format Conference or Workshop Item
author Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
author_facet Abdul-Latip, S. F.
Reyhanitabar, M. R.
Susilo, W.
Seberry, J.
author_sort Abdul-Latip, S. F.
title Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
title_short Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
title_full Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
title_fullStr Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
title_full_unstemmed Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
title_sort extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
publisher ACM
publishDate 2011
url http://eprints.utem.edu.my/id/eprint/84/1/ASIACCS_2011.pdf
http://eprints.utem.edu.my/id/eprint/84/
http://doi.acm.org/10.1145/1966913.1966952
_version_ 1665905238500966400