[Infowarrior] - New attack against multiple encryption functions

Richard Forno rforno at infowarrior.org
Fri Aug 22 19:14:23 UTC 2008


New attack against multiple encryption functions
New mathematical attack works against a broad range cryptographic  
functions.
Carl Jongsma 22/08/2008 10:01:00

http://www.computerworld.com.au/index.php/id;1395888957;fp;;fpid;;pf;1

Unless you're a dyed in the wool cryptographic geek you probably  
didn't know that there was a Crypto conference, or even a chain of  
worldwide crypto conferences that take place each year. Fortunately,  
for the most of us that aren't crypto geeks there are a handful of  
very highly skilled people who are; they can take the highly  
theoretical and complex mathematical proofs and arguments that make up  
most of modern cryptographic and cryptanalytic research and put it  
into plain language.

Probably the best known is Bruce Schneier, who is a dedicated crypto  
geek famous for his general Information Security and cryptographic  
work; including being responsible (or partly responsible) for ciphers  
such as Blowfish and Twofish. From his blog he has provided a  
tantalising suggestion that one of the most famous names in  
cryptography is introducing a new form of cryptanalysis.

Adi Shamir, who is the S in RSA, has presented material at the Crypto  
2008 conference that has promised a new form of mathematical attack  
against a broad range of cryptographic ciphers, including hash  
functions (such as MD5, SHA-256), stream ciphers (such as RC4), and  
block ciphers (such as DES, Triple-DES, AES). The new method of  
cryptanalysis has been called a "cube attack" and formed part of  
Shamir's invited presentation at Crypto 2008 - "How to solve it: New  
Techniques in Algebraic Cryptanalysis".

Comments from people who saw the presentation and had a chance to  
speak with Shamir (drawn from the comments in Schneier's blog)  
indicate that the new attack method isn't necessarily going to work  
against the exact ciphers listed above, but it presents a new generic  
attack method that can target basically formed ciphers irrespective of  
the basic cipher method in use, provided that it can be described in a  
"low-degree polynomial equation".

Without access to the paper (expected to be published later this  
year), the full scope of the discovery can't be easily determined. It  
may be that it delivers an order of magnitude improvement over  
existing methods, but implementation will still take such a long  
period of time that it is effectively impractical for attack against  
time sensitive content. Then again, it may be that it has brought it  
into a viable timeframe, something that can be achieved with a handful  
of modern machines - nothing that is too far out of reach of the  
motivated and resourced attacker.

What may be the biggest outcome from this research is the range of  
devices in widespread use that use weaker cryptographic protection,  
due to power or size limitations, that are now vulnerable to a  
straight forward mathematical attack. This might mean that some  
content delivery systems or simple communications channels are now  
vulnerable to a viable attack, or it could just form the basis of  
interesting class work for budding cryptographers and cryptanalysts.

Either way, it is something that will be worth watching over the next  
12-18 months to see how it evolves.



More information about the Infowarrior mailing list