Analysis of the success probability of cube attack

The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic support to cube attack.The theoretical results mee...

Full description

Saved in:
Bibliographic Details
Main Authors: Hai-xin SONG, Xiu-bin FAN, Chuan-kun WU, Deng-guo FENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)10-0143-06/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539869547954176
author Hai-xin SONG
Xiu-bin FAN
Chuan-kun WU
Deng-guo FENG
author_facet Hai-xin SONG
Xiu-bin FAN
Chuan-kun WU
Deng-guo FENG
author_sort Hai-xin SONG
collection DOAJ
description The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic support to cube attack.The theoretical results meet with the experimental results of the analysis of the stream ciphers Trivium and Grain v1 very closely.
format Article
id doaj-art-6831ac40994948b88c62a4e9e3b35ddf
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6831ac40994948b88c62a4e9e3b35ddf2025-01-14T06:33:09ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-10-013314314859665735Analysis of the success probability of cube attackHai-xin SONGXiu-bin FANChuan-kun WUDeng-guo FENGThe success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic support to cube attack.The theoretical results meet with the experimental results of the analysis of the stream ciphers Trivium and Grain v1 very closely.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)10-0143-06/cube attacksuccess probabilitykey recoveryGrain v1Boolean function
spellingShingle Hai-xin SONG
Xiu-bin FAN
Chuan-kun WU
Deng-guo FENG
Analysis of the success probability of cube attack
Tongxin xuebao
cube attack
success probability
key recovery
Grain v1
Boolean function
title Analysis of the success probability of cube attack
title_full Analysis of the success probability of cube attack
title_fullStr Analysis of the success probability of cube attack
title_full_unstemmed Analysis of the success probability of cube attack
title_short Analysis of the success probability of cube attack
title_sort analysis of the success probability of cube attack
topic cube attack
success probability
key recovery
Grain v1
Boolean function
url http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)10-0143-06/
work_keys_str_mv AT haixinsong analysisofthesuccessprobabilityofcubeattack
AT xiubinfan analysisofthesuccessprobabilityofcubeattack
AT chuankunwu analysisofthesuccessprobabilityofcubeattack
AT dengguofeng analysisofthesuccessprobabilityofcubeattack