Differential Attacks: Using Alternative Operations

نویسندگان

  • Céline Blondeau
  • Roberto Civino
  • Massimiliano Sala
چکیده

Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate the possibility to design a block cipher which appears to be secure w.r.t. classical differential cryptanalysis, but weaker with respect to our attack which make use of alternative operations. Furthermore we compare the success probabilities of a distinguishing attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential attacks using alternative operations and block cipher design

Block ciphers and their security are the main subjects of this seminar. In the first part it is described the impact of differential cryptanalysis, a powerful statistical attack against block ciphers, when operations different from the one used to perform the key addition are considered on the message space. It is proven that when an alternative difference operation is carefully designed, a cip...

متن کامل

Total break of Zorro using linear and differential attacks

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

متن کامل

P155: Differential Diagnosis of Panic Attacks: Using a Decision Tree

Panic attacks are discrete episodes of intense fear or discomfort accompanied by symptoms such as palpitations, shortness of breath, sweating, trembling, derealization and a fear of losing control or dying. Although panic attacks are required for a diagnosis of panic disorder, they also occur in association with a host of other disorders listed in the 5h version of the diagnostic and statistica...

متن کامل

Differential-Linear Attacks against the Stream

The previous key recovery attacks against Helix obtain the key with about 2 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 2 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 2 chosen nonces and 2 chosen plaint...

متن کامل

Differential-Linear Attacks Against the Stream Cipher Phelix

The previous key recovery attacks against Helix obtain the key with about 2 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 2 chosen plaintext words). The stream cipher Phelix is the strengthened version of Helix. In this paper we apply the differential-linear cryptanalysis to recover the key of Phelix. With 2 chosen nonces and 2 chosen plaint...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017