Cryptanalysis on PHOTON hash function using cube attack

Chia-Yu Lu, You Lin, S. Jen, J. Yang
{"title":"Cryptanalysis on PHOTON hash function using cube attack","authors":"Chia-Yu Lu, You Lin, S. Jen, J. Yang","doi":"10.1109/ISIC.2012.6449760","DOIUrl":null,"url":null,"abstract":"The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449760","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.
基于立方体攻击的光子哈希函数密码分析
轻量级哈希函数PHOTON显示出优异的硬件紧凑性,几乎达到理论最佳,并为标签上应用带来好处。不同于试图在光子上寻找碰撞或建立区分符的密码分析,我们采用立方体攻击来恢复光子的秘密。我们的实验集中在1到3轮PHOTON-128/16/16。使用立方体攻击,我们证明至少有一半的消息位可以被恢复。当使用更强大的计算能力时,可以在相同数量的光子轮中恢复更多的消息位。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信