Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter January 20, 2010

Numerical solvers and cryptanalysis

  • Mario Lamberger , Tomislav Nad and Vincent Rijmen

Abstract

In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category. We use numerical methods to attack a reduced version of Trivium – called Bivium A. We first set up a system of equations describing the internal state of the cipher and convert it into a system over the reals. Four different techniques for the conversion are discussed. At this point we are able to apply numerical methods. We choose the DIRECT algorithm by D. R. Jones et al. and the Interior Reflective Newton Method by Coleman and Li. Results, occurring problems in this approach and possible future research directions are discussed.

Received: 2008-12-30
Revised: 2009-09-29
Published Online: 2010-01-20
Published in Print: 2009-September

© de Gruyter 2009

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 26.4.2024 from https://www.degruyter.com/document/doi/10.1515/JMC.2009.015/html
Scroll to top button