Quantum Differential and Linear Cryptanalysis
نویسندگان
چکیده
منابع مشابه
Quantum Differential and Linear Cryptanalysis
Quantum computers, that may become available one day, will impact many scientific fields. Cryptography is certainly one of them since many asymmetric primitives would become insecure against an adversary with quantum capabilities. Cryptographers are already anticipating this threat by proposing and studying a number of potentially quantum-safe alternatives for those primitives. On the other han...
متن کاملEnhancing Differential-Linear Cryptanalysis
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linear relations. In 1994, Langford and Hellman showed that both kinds of analysis can be combined together by a technique called differential-linear cryptanalysis, in which the differential part creates a linear approxima...
متن کاملQuantum impossible differential and truncated differential cryptanalysis
We study applications of BV algorithm and present quantum versions of impossible differential cryptanalysis and truncated differential cryptanalysis based on it. Afterwards, we analyze their efficiencies and success probabilities rigorously. In traditional impossible differential attack or truncated differential attack, it is difficult to extend the differential path, which usually limits the n...
متن کاملDifferential-Linear Cryptanalysis of Serpent
Serpent is a 128-bit SP-Network block cipher consisting of 32 rounds with variable key length (up to 256 bits long). It was selected as one of the 5 AES finalists. The best known attack so far is a linear attack on an 11-round reduced variant. In this paper we apply the enhanced differential-linear cryptanalysis to Serpent. The resulting attack is the best known attack on 11-round Serpent. It r...
متن کاملDifferential-Linear Cryptanalysis of ICEPOLE
ICEPOLE is a CAESAR candidate with the intermediate level of robustness under nonce misuse circumstances in the original document. In particular, it was claimed that key recovery attack against ICEPOLE is impossible in the case of nonce misuse. ICEPOLE is strong against the differential cryptanalysis and linear cryptanalysis. In this paper, we developed the differential-linear attacks against I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Symmetric Cryptology
سال: 2016
ISSN: 2519-173X
DOI: 10.46586/tosc.v2016.i1.71-94