Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized...

Full description

Bibliographic Details
Main Authors: Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8962078/
_version_ 1819276525854261248
author Yu He
Gaoli Wang
Wenshan Li
Yizhi Ren
author_facet Yu He
Gaoli Wang
Wenshan Li
Yizhi Ren
author_sort Yu He
collection DOAJ
description With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized as one of the most effective approaches to implement confidentiality, integrity, and message authentication for the security of IoT. In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack. Firstly, we introduce a method to identify good cubes, which leads to the largest-round distinguisher. Our idea is based on the greedy algorithm of finding cubes and the numeric mapping method for estimating the algebraic degree of the NFSR-based cryptosystem. By using this method, we can efficiently explore useful cubes from a large search space. Further, we evaluate the security of several cryptographic primitives against the cube attack by using the SAT model of division property and flag technique, which can make the propagation of division property more accurately. Experiments show that we can obtain some new or improved cryptanalysis on MORUS-640-128, TRIAD, Quartet, TriviA-ck-v2, and Enhanced-bivium. The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers.
first_indexed 2024-12-23T23:41:37Z
format Article
id doaj.art-e6e7989544e94478b7e8cbb28e0c325f
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-23T23:41:37Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-e6e7989544e94478b7e8cbb28e0c325f2022-12-21T17:25:39ZengIEEEIEEE Access2169-35362020-01-018209202093010.1109/ACCESS.2020.29670708962078Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of ThingsYu He0https://orcid.org/0000-0002-0340-222XGaoli Wang1https://orcid.org/0000-0002-2121-9306Wenshan Li2https://orcid.org/0000-0002-7968-2678Yizhi Ren3https://orcid.org/0000-0002-1421-9164Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaShanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaShanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaCyberspace School, Hangzhou Dianzi University, Hangzhou, ChinaWith technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized as one of the most effective approaches to implement confidentiality, integrity, and message authentication for the security of IoT. In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack. Firstly, we introduce a method to identify good cubes, which leads to the largest-round distinguisher. Our idea is based on the greedy algorithm of finding cubes and the numeric mapping method for estimating the algebraic degree of the NFSR-based cryptosystem. By using this method, we can efficiently explore useful cubes from a large search space. Further, we evaluate the security of several cryptographic primitives against the cube attack by using the SAT model of division property and flag technique, which can make the propagation of division property more accurately. Experiments show that we can obtain some new or improved cryptanalysis on MORUS-640-128, TRIAD, Quartet, TriviA-ck-v2, and Enhanced-bivium. The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers.https://ieeexplore.ieee.org/document/8962078/IoTCAESARNISTSATauthenticated cipherstream cipher
spellingShingle Yu He
Gaoli Wang
Wenshan Li
Yizhi Ren
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
IEEE Access
IoT
CAESAR
NIST
SAT
authenticated cipher
stream cipher
title Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
title_full Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
title_fullStr Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
title_full_unstemmed Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
title_short Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
title_sort improved cube attacks on some authenticated encryption ciphers and stream ciphers in the internet of things
topic IoT
CAESAR
NIST
SAT
authenticated cipher
stream cipher
url https://ieeexplore.ieee.org/document/8962078/
work_keys_str_mv AT yuhe improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings
AT gaoliwang improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings
AT wenshanli improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings
AT yizhiren improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings