Integral Cryptanalysis of WARP based on Monomial Prediction

نویسندگان

چکیده

WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as lightweight alternative to AES. It based on generalized Feistel network and achieves the smallest area footprint among ciphers in many settings. Previous analysis results include integral key-recovery attacks 21 out of 41 rounds. In this paper, we propose up 32 rounds improving both distinguisher approach substantially. For distinguisher, show how model monomial prediction technique proposed Hu ASIACRYPT SAT problem thus create bit-oriented taking key schedule into account. Together with two additional observations properties WARP’s construction, extend best previous 2 (as classical distinguisher) or 4 (for distinguisher). recovery, graph-based round function demonstrate manipulate graph obtain representation amenable FFT-based recovery.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integral Cryptanalysis

This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only.

متن کامل

Integral Cryptanalysis ( Extended abstract )

This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only.

متن کامل

Integral Closures of Cohen-macaulay Monomial Ideals

The purpose of this paper is to present a family of CohenMacaulay monomial ideals such that their integral closures have embedded components and hence are not Cohen-Macaulay.

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

Chapter 5 - integral cryptanalysis

The history of integral cryptanalysis is a little complicated, and the most important papers to study regarding it are not in fact the ones in which it was first defined. We give a brief recap here: In 1997, Daemen, Knudsen, and Rijmen published a paper [3] describing a new cipher. This cipher, SQUARE, was a forerunner of Rijndael [10], the eventual AES, and was designed using the same wide tra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2022

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2022.i2.92-112