TY - JOUR AU - Hao, Yonglin AU - Jiao, Lin AU - Li, Chaoyun AU - Meier, Willi AU - Todo, Yosuke AU - Wang, Qingju PY - 2020/05/07 Y2 - 2024/03/28 TI - Links between Division Property and Other Cube Attack Variants JF - IACR Transactions on Symmetric Cryptology JA - ToSC VL - 2020 IS - 1 SE - Articles DO - 10.13154/tosc.v2020.i1.363-395 UR - https://tosc.iacr.org/index.php/ToSC/article/view/8569 SP - 363-395 AB - <p>A theoretically reliable key-recovery attack should evaluate not only the <em>non-randomness</em> for the correct key guess but also the <em>randomness</em> for the wrong ones as well. The former has always been the main focus but the absence of the latter can also cause self-contradicted results. In fact, the theoretic discussion of wrong key guesses is overlooked in quite some existing key-recovery attacks, especially the previous cube attack variants based on pure experiments. In this paper, we draw links between the division property and several variants of the cube attack. In addition to the zero-sum property, we further prove that the bias phenomenon, the non-randomness widely utilized in dynamic cube attacks and cube testers, can also be reflected by the division property. Based on such links, we are able to provide several results: Firstly, we give a dynamic cube key-recovery attack on full Grain-128. Compared with Dinur et al.’s original one, this attack is supported by a theoretical analysis of the bias based on a more elaborate assumption. Our attack can recover 3 key bits with a complexity 2<sup>97.86</sup> and evaluated success probability 99.83%. Thus, the overall complexity for recovering full 128 key bits is 2<sup>125</sup>. Secondly, now that the bias phenomenon can be efficiently and elaborately evaluated, we further derive new secure bounds for Grain-like primitives (namely Grain-128, Grain-128a, Grain-V1, Plantlet) against both the zero-sum and bias cube testers. Our secure bounds indicate that 256 initialization rounds are not able to guarantee Grain-128 to resist bias-based cube testers. This is an efficient tool for newly designed stream ciphers for determining the number of initialization rounds. Thirdly, we improve Wang et al.’s relaxed term enumeration technique proposed in CRYPTO 2018 and extend their results on Kreyvium and ACORN by 1 and 13 rounds (reaching 892 and 763 rounds) with complexities 2<sup>121.19</sup> and 2<sup>125.54</sup> respectively. To our knowledge, our results are the current best key-recovery attacks on these two primitives.</p> ER -