Multi-trail Statistical Saturation Attacks

نویسندگان

  • Baudoin Collard
  • François-Xavier Standaert
چکیده

Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we investigate the existence of better trails than the one used in the former attack. For this purpose, we provide a theoretical evaluation of the trail distributions using probability transition matrices. Since the exhaustive evaluation of all possible distributions turned out to be computationally hard, we additionally provide a heuristic branch-and-bound algorithm that allows us to generate a large number of good trails. These tools confirm that the trail of CT-RSA 2009 was among the best possible ones, but also suggest that numerous other trails have similar properties. As a consequence, we investigate the use of multiple trails and show that it allows significant improvements of the previous cryptanalysis attempts against PRESENT. Estimated complexities indicate that PRESENT-80 is safe against key recovery, by a small security margin. We also discuss the impact of multiple trails for the security of the full PRESENT-128. We finally put forward a “statistical hull” effect that makes the precise theoretical analysis of our results difficult, when the number of block cipher rounds increases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Off-Line Intrusion Detection Using a Genetic Algorithm

One of the primary approaches to the increasingly important problem of computer security is the Intrusion Detection System. Various architectures and approaches have been proposed including: Statistical, rule-based approaches; Neural Networks; Immune Systems; Genetic Algorithms; and Genetic Programming. This paper focuses on the development of an off-line Intrusion Detection System to analyze a...

متن کامل

Effect of Nail Polish on Pulse Oximetry Findings in Healthy Volunteers: A Randomized Clinical Trail

Background and Objectives: Pulse oximetry is the most common technique for monitoring hemoglobin oxygen saturation (SpO2). Different colors and brands of nail polish may cause disturbance in the reading and interpretation of oxygen saturation. The aim of this study was to determine the effect of different colors of nail polish on oxygen saturation measured by pulse oximeter. Methods: Thirty he...

متن کامل

Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities

The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give essentially complementary information about the security of block ciphers. While mathematical links between some statistical attacks have been derived in the last couple of years, the important lin...

متن کامل

Statistical physics modeling of equilibrium adsorption of cadmium ions onto activated carbon, chitosan and chitosan/activated carbon composite

The adsorption ability of activated carbon, chitosan, and chitosan/activated carbon composite for cadmium separation from aqueous solution was analyzed via statistical physical modeling. The equilibrium data were analyzed by Langmuir, Hill, double layer model, and the multi-layer model with saturation isotherm models. Results showed that the multi-layer model with saturation could well describe...

متن کامل

Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks

Although the prevention of Distributed Denial of Service (DDoS) attacks is not possible, detection of such attacks plays main role in preventing their progress. In the flooding attacks, especially new sophisticated DDoS, the attacker floods the network traffic toward the target computer by sending pseudo-normal packets. Therefore, multi-purpose IDSs do not offer a good performance (and accuracy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010