Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8962078/ |
_version_ | 1819276525854261248 |
---|---|
author | Yu He Gaoli Wang Wenshan Li Yizhi Ren |
author_facet | Yu He Gaoli Wang Wenshan Li Yizhi Ren |
author_sort | Yu He |
collection | DOAJ |
description | With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized as one of the most effective approaches to implement confidentiality, integrity, and message authentication for the security of IoT. In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack. Firstly, we introduce a method to identify good cubes, which leads to the largest-round distinguisher. Our idea is based on the greedy algorithm of finding cubes and the numeric mapping method for estimating the algebraic degree of the NFSR-based cryptosystem. By using this method, we can efficiently explore useful cubes from a large search space. Further, we evaluate the security of several cryptographic primitives against the cube attack by using the SAT model of division property and flag technique, which can make the propagation of division property more accurately. Experiments show that we can obtain some new or improved cryptanalysis on MORUS-640-128, TRIAD, Quartet, TriviA-ck-v2, and Enhanced-bivium. The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers. |
first_indexed | 2024-12-23T23:41:37Z |
format | Article |
id | doaj.art-e6e7989544e94478b7e8cbb28e0c325f |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-23T23:41:37Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-e6e7989544e94478b7e8cbb28e0c325f2022-12-21T17:25:39ZengIEEEIEEE Access2169-35362020-01-018209202093010.1109/ACCESS.2020.29670708962078Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of ThingsYu He0https://orcid.org/0000-0002-0340-222XGaoli Wang1https://orcid.org/0000-0002-2121-9306Wenshan Li2https://orcid.org/0000-0002-7968-2678Yizhi Ren3https://orcid.org/0000-0002-1421-9164Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaShanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaShanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, ChinaCyberspace School, Hangzhou Dianzi University, Hangzhou, ChinaWith technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks, employing cryptosystems is widely recognized as one of the most effective approaches to implement confidentiality, integrity, and message authentication for the security of IoT. In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack. Firstly, we introduce a method to identify good cubes, which leads to the largest-round distinguisher. Our idea is based on the greedy algorithm of finding cubes and the numeric mapping method for estimating the algebraic degree of the NFSR-based cryptosystem. By using this method, we can efficiently explore useful cubes from a large search space. Further, we evaluate the security of several cryptographic primitives against the cube attack by using the SAT model of division property and flag technique, which can make the propagation of division property more accurately. Experiments show that we can obtain some new or improved cryptanalysis on MORUS-640-128, TRIAD, Quartet, TriviA-ck-v2, and Enhanced-bivium. The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers.https://ieeexplore.ieee.org/document/8962078/IoTCAESARNISTSATauthenticated cipherstream cipher |
spellingShingle | Yu He Gaoli Wang Wenshan Li Yizhi Ren Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things IEEE Access IoT CAESAR NIST SAT authenticated cipher stream cipher |
title | Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things |
title_full | Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things |
title_fullStr | Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things |
title_full_unstemmed | Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things |
title_short | Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things |
title_sort | improved cube attacks on some authenticated encryption ciphers and stream ciphers in the internet of things |
topic | IoT CAESAR NIST SAT authenticated cipher stream cipher |
url | https://ieeexplore.ieee.org/document/8962078/ |
work_keys_str_mv | AT yuhe improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings AT gaoliwang improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings AT wenshanli improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings AT yizhiren improvedcubeattacksonsomeauthenticatedencryptionciphersandstreamciphersintheinternetofthings |