{"title":"基于立方体攻击的光子哈希函数密码分析","authors":"Chia-Yu Lu, You Lin, S. Jen, J. Yang","doi":"10.1109/ISIC.2012.6449760","DOIUrl":null,"url":null,"abstract":"The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Cryptanalysis on PHOTON hash function using cube attack\",\"authors\":\"Chia-Yu Lu, You Lin, S. Jen, J. Yang\",\"doi\":\"10.1109/ISIC.2012.6449760\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.\",\"PeriodicalId\":393653,\"journal\":{\"name\":\"2012 International Conference on Information Security and Intelligent Control\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Information Security and Intelligent Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIC.2012.6449760\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449760","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis on PHOTON hash function using cube attack
The lightweight hash function PHOTON has shown excellent hardware compactness which almost reaches the theoretical optimum and brings benefits for on-tag applications. Unlike cryptanalysis which tries to find collisions or build distinguishers on PHOTON, we apply cube attack for secret recovery of PHOTON. We focus on 1 to 3 round of PHOTON-128/16/16 in our experiments. Using cube attack, we show at least half of the message bits can be recovered. When more powerful computing capability is used, it is possible to recover more bits of the message in the same number of PHOTON rounds.