## CryptoDB

### Paper: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt

Authors: Nicolas T. Courtois URL: http://eprint.iacr.org/2002/087 Search ePrint Search Google There is abundant literature on how to use linear approximations to break various stream ciphers. In this paper we show that it is possible to design an efficient attack based on higher degree approximations. We reduce the attack to solving an overdefined system of multivariate equations and use the XL algorithm from Eurocrypt 2000. The complexity of the XL algorithm is sometimes controversial, however in practice and for the cases relevant here (much more equations than variables), we show that the behaviour of XL is predictable with the utmost precision and 100% accuracy. Our new attack allows to break efficiently stream ciphers that are known to be immune to all the previously known attacks. It has also surprisingly small and loose requirements on the keystream needed, giving powerful attack scenarios, leading even to (almost) ciphertext-only attacks. For example, the new attack breaks the stream cipher Toyocrypt submitted to the Japanese government Cryptrec call for cryptographic primitives, and one of only two candidates accepted to the second phase of Cryptrec evaluation process. Toyocrypt is a 128-bit stream cipher and at the time of submission it was claimed to resist to all known attacks. Later, Mihaljevic and Imai showed that the effective key length in Toyocrypt is only 96 bits. Still Toyocrypt may be easily modified to avoid this attack and have full 128 bit key. Our best attack breaks both Toyocrypt and the modified versions taking exactly 2^92 CPU clocks for a 128-bit cipher. Moreover it works in much less restrictive conditions that the previous attack, for example knowing ONLY that the ciphertext is in English.
##### BibTeX
@misc{eprint-2002-11610,
title={Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt},
booktitle={IACR Eprint archive},
keywords={Algebraic cryptanalysis, multivariate equations, overdefined equations, Reed-Muller codes, correlation immunity, XL algorithm, Gr?bner bases, stream ciphers, pseudo-random generators, nonlinear filtering, ciphertext-only attacks, Toyocrypt, Cryptrec.},
url={http://eprint.iacr.org/2002/087},
note={Presented at 5th International Conference on Information Security and Cryptology (ICISC 2002), November 28-29, 2002, Seoul, Korea. This as a full and updated version. courtois@minrank.org 12096 received 2 Jul 2002, last revised 13 Feb 2003},
author={Nicolas T. Courtois},
year=2002
}