Feeds

Crypto guru thinks outside the box with Cube attack

Stream ciphers easily split (maybe)

Protecting against web application threats using SSL

Senior cryptologist Adi Shamir is developing a new attack for rooting out potential weaknesses in encryption ciphers, dubbed the Cube Attack.

Shamir, the S in RSA, explained at a talk at the Crypto2008 conference earlier this month that the attack methodology would succeed against cypher schemes providing that they can be represented by "low-degree polynomial equations"*. If that sounds as complex as working out the meaning of the numbers used to signify the location of rooms and whether they are booby-trapped in the cult film Cube, then you are on the right page.

Block ciphers - anything ranging from AES to DES - are too complex for the approach to work, but functions such as linear feedback shift register (LFSR) schemes might be attacked using the approach, cryptography guru Bruce Schneier writes. That means functions such as pseudo-random number generators used in stream ciphers might be unpicked, creating a new and possibly more powerful technique for decrypting the forms of encryption used by GSM mobile phone and Bluetooth devices, for example.

Attack techniques that target the weaknesses of cryptographic systems on systems constrained to using less robust encryption because of either size or power limitations already exist but the Cube technique is potentially faster and more elegant.

Shamir gave only a tantalizing glimpse of his work at Crypto2008 during a talk entitled How to solve it: New Techniques in Algebraic Cryptanalysis.

Shamir and co-author plan to present a full treatment of the work at the Eurocrypt 2009 conference in Germany next April. ®

* A very simple low-order polynomial equation would be something like ƒ(x) = x2 - 2x.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.