Abstract
In this work, we describe the first single-key attack on the full version of Grain-128 that can recover arbitrary keys. Our attack is based on a new version of a cube tester, which is a factor of about 238 faster than exhaustive search. To practically verify our results, we implemented the attack on the reconfigurable hardware cluster RIVYERA and tested the main components of the attack for dozens of random keys. Our experiments successfully demonstrated the correctness and expected com-plexity of the attack by finding a very significant bias in our new cube tester for about 7.5 % of the tested keys. This is the first time that the main components of a complex analytical attack against a digital full-size cipher were successfully implemented using special-purpose hardware, truly exploiting the reconfigurable nature of an FPGA-based cryptanalytical device
Original language | English GB |
---|---|
Number of pages | 14 |
State | Published - 27 Aug 2015 |
Keywords
- Special-purpose hardware
- Grain-128
- stream cipher
- cryptanalysis
- cube attacks
- cube