[Resource Topic] 2015/1009: Applications of Key Recovery Cube-attack-like

Welcome to the resource topic for 2015/1009

Title:
Applications of Key Recovery Cube-attack-like

Authors: Pawel Morawiecki, Josef Pieprzyk, Michal Straus, Marian Srebrny

Abstract:

In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Phase, where complexity can be calculated without running the actual experiments and random-like search for the cubes. We apply our method to a few different cryptographic algorithms, showing that the method can be used against a wide range of cryptographic primitives, including hash functions and authenticated encryption schemes. We also show that our key-recovery approach could be a framework for side-channel attacks, where the attacker has to deal with random errors in measurements.

ePrint: https://eprint.iacr.org/2015/1009

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .