2009
DOI: 10.1007/s11786-009-0016-7
|View full text |Cite
|
Sign up to set email alerts
|

Optimising Gröbner Bases on Bivium

Abstract: Bivium is a reduced version of the stream cipher Trivium. In this paper we investigate how fast a key recovery attack on Bivium using Gröbner bases is. First we explain the attack scenario and the cryptographic background. Then we identify the factors that have impact on the computation time and show how to optimise them. As a side effect these experiments benchmark several Gröbner basis implementations. The optimised version of the Gröbner attack has an expected running time of 2 39.12 s, beating the attack t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…• Biviumb: a polynomial system originated from the problem of recovering the internal states of the stream cipher Bivium-B (Raddum, 2006;Eibach and Völkel, 2010), which is a reduced version of stream cipher Trivium. By setting the 177-bit internal states as variables, and using 160-bit keystream, we can generate a polynomial system with 177 variables, 160 polynomials and degree 3.…”
Section: Theorem 19 Letmentioning
confidence: 99%
“…• Biviumb: a polynomial system originated from the problem of recovering the internal states of the stream cipher Bivium-B (Raddum, 2006;Eibach and Völkel, 2010), which is a reduced version of stream cipher Trivium. By setting the 177-bit internal states as variables, and using 160-bit keystream, we can generate a polynomial system with 177 variables, 160 polynomials and degree 3.…”
Section: Theorem 19 Letmentioning
confidence: 99%
“…Non-deterministic Oracle Backdoor Sets correspond to cryptographic attacks, where NP-oracles are used to solve subproblems constructed for a specific Backdoor set. For instance, very similar approach was applied to cryptanalysis of the widely known Bivium and Trivium ciphers (Eibach, Pilz, and Völkel 2008;Semenov and Zaikin 2016;Eibach, Völkel, and Pilz 2010;Huang and Lin 2011).…”
Section: Guess-and-determine Attacks On Cryptographic Functionsmentioning
confidence: 99%
“…In fact, by using the inverse of the difference system governing the state, some opponent may recover the initial state containing the key by attacking any internal state. This technique has been used, for instance, to attack Trivium cipher and its simplified version Bivium (see [12,14] and Section 5 and 6).…”
Section: Introductionmentioning
confidence: 99%