Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware

Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann

Research output: Working paper/PreprintWorking paper

Abstract

In this work, we describe the first single-key attack on the full version of Grain-128 that can recover arbitrary keys. Our attack is based on a new version of a cube tester, which is a factor of about 238 faster than exhaustive search. To practically verify our results, we implemented the attack on the reconfigurable hardware cluster RIVYERA and tested the main components of the attack for dozens of random keys. Our experiments successfully demonstrated the correctness and expected com-plexity of the attack by finding a very significant bias in our new cube tester for about 7.5 % of the tested keys. This is the first time that the main components of a complex analytical attack against a digital full-size cipher were successfully implemented using special-purpose hardware, truly exploiting the reconfigurable nature of an FPGA-based cryptanalytical device
Original languageEnglish GB
Number of pages14
StatePublished - 27 Aug 2015

Keywords

  • Special-purpose hardware
  • Grain-128
  • stream cipher
  • cryptanalysis
  • cube attacks
  • cube

Fingerprint

Dive into the research topics of 'Experimentally Verifying a Complex Algebraic Attack on the Grain-128 Cipher Using Dedicated Reconfigurable Hardware'. Together they form a unique fingerprint.

Cite this