Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F24%3A00377368" target="_blank" >RIV/68407700:21240/24:00377368 - isvavai.cz</a>
Result on the web
<a href="https://doi.org/10.1007/s11416-024-00540-2" target="_blank" >https://doi.org/10.1007/s11416-024-00540-2</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/s11416-024-00540-2" target="_blank" >10.1007/s11416-024-00540-2</a>
Alternative languages
Result language
angličtina
Original language name
Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods
Original language description
This paper deals with reducing the secret key computation time of small scale variants of the AES cipher using algebraic cryptanalysis, which is accelerated by data mining methods. This work is based on the known plaintext attack and aims to speed up the calculation of the secret key by processing the polynomial equations extracted from plaintext-ciphertext pairs. Specifically, we propose to transform the overdefined system of polynomial equations over GF(2) into a new system so that the computation of the Gröbner basis using the F4 algorithm takes less time than in the case of the original system. The main idea is to group similar polynomials into clusters, and for each cluster, sum the two most similar polynomials, resulting in simpler polynomials. We compare different data mining techniques for finding similar polynomials, such as clustering or locality-sensitive hashing (LSH). Experimental results show that using the LSH technique, we get a system of equations for which we can calculate the Gröbner basis the fastest compared to the other methods that we consider in this work. Experimental results also show that the time to calculate the Gröbner basis for the transformed system of equations is significantly reduced compared to the case when the Gröbner basis was calculated from the original non-transformed system. This paper demonstrates that reducing an overdefined system of equations reduces the computation time for finding a secret key.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/EF16_019%2F0000765" target="_blank" >EF16_019/0000765: Research Center for Informatics</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach
Others
Publication year
2024
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Journal of Computer Virology and Hacking Techniques
ISSN
2263-8733
e-ISSN
—
Volume of the periodical
20
Issue of the periodical within the volume
4
Country of publishing house
FR - FRANCE
Number of pages
16
Pages from-to
885-900
UT code for WoS article
001322426100001
EID of the result in the Scopus database
2-s2.0-85205341843