International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Modeling for Three-Subset Division Property without Unknown Subset -- Improved Cube Attacks against Trivium and Grain-128AEAD

Authors:
Yonglin Hao , State Key Laboratory of Cryptology
Gregor Leander , Ruhr University Bochum
Willi Meier , FHNW
Yosuke Todo , NTT Secure Platform Laboratories
Qingju Wang , University of Luxembourg
Download:
DOI: 10.1007/978-3-030-45721-1_17 (login may be required)
Search ePrint
Search Google
Conference: EUROCRYPT 2020
Abstract: A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers, it enables us to estimate the security of cube attacks theoretically, and it leads to the best key-recovery attacks against well-known stream ciphers. However, it was reported that some of the key-recovery attacks based on the division property degenerate to distinguishing attacks due to the inaccuracy of the division property. Three-subset division property (without unknown subset) is a promising method to solve this inaccuracy problem, and a new algorithm using automatic tools for the three-subset division property was recently proposed at Asiacrypt2019. In this paper, we first show that this state-of-the-art algorithm is not always efficient and we cannot improve the existing key-recovery attacks. Then, we focus on the feature of the three-subset division property without unknown subset and propose another new efficient algorithm using automatic tools. Our algorithm is more efficient than existing algorithms, and it can improve existing key-recovery attacks. In the application to Trivium, we show a 841-round key-recovery attack. We also show that a 855-round key-recovery attack, which was proposed at CRYPTO2018, has a critical flaw and does not work. As a result, our 841-round attack becomes the best key-recovery attack. In the application to Grain-128AEAD, we show that the known 184-round key-recovery attack degenerates to distinguishing attacks. Then, the distinguishing attacks are improved up to 189 rounds, and we also show the best key-recovery attack against 190 rounds.
Video from EUROCRYPT 2020
BibTeX
@inproceedings{eurocrypt-2020-30218,
  title={Modeling for Three-Subset Division Property without Unknown Subset -- Improved Cube Attacks against Trivium and Grain-128AEAD},
  booktitle={39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  keywords={stream ciphers;cube attack;division property;three-subset division property;MILP;Trivium;Grain-128AEAD},
  volume={12105},
  doi={10.1007/978-3-030-45721-1_17},
  author={Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang},
  year=2020
}