2011
DOI: 10.1007/978-3-642-22497-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Techniques in Differential Cryptanalysis Revisited

Abstract: At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three new attacks, namely Attack A, Attack B and Attack C. For Attack A, they explain that the time complexity is difficult to determine. The goal of Attacks B and C is to filter out wrong pairs and then recover the key. In this paper, we show that Attack C does not provide an advantage over differential cryptanalysis for typical block ciphers, because it cannot be used to fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 22 publications
(41 reference statements)
0
6
0
Order By: Relevance
“…In this section, sample confusion components of Section 4 are evaluated through the standard confusion component evaluation criteria [32][33][34][35][36][37][38][39][40][41][42][43][44], which includes bit independence criterion(BIC), linear approximation probability (LP), strict avalanche criterion (SAC), nonlinearity score, and differential approximation probability (DP).…”
Section: Results Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, sample confusion components of Section 4 are evaluated through the standard confusion component evaluation criteria [32][33][34][35][36][37][38][39][40][41][42][43][44], which includes bit independence criterion(BIC), linear approximation probability (LP), strict avalanche criterion (SAC), nonlinearity score, and differential approximation probability (DP).…”
Section: Results Evaluationmentioning
confidence: 99%
“…As mentioned earlier, chaos-and algebraic-based techniques are extensively used to design the confusion component. Chaos-and algebraic-based techniques provide favorable features for the design of confusion components; however, researchers have also identified various cryptanalysis on these techniques including interpolation attacks [9][10][11][12], Gröbner basis attack [13][14][15][16][17][18][19], SAT solver [20][21][22][23][24][25][26][27], linear and differential attacks [28][29][30][31][32][33][34][35][36][37][38][39][40][41][42], XL attacks [43][44][45], and XSL attack [9,[46][47][48][49][50][51][52][53][54][55]. Similarly, ...…”
Section: Attacks On Confusion Component Design Schemesmentioning
confidence: 99%
“…In our experiments we use a 4-round SPN with n B = 16, m = 4 with variable S-boxes, and a fixed permutation layer given by bit permutation (1,5,9,13,2,6,10,14,3,7,11,15,4,8,12,16). As a key schedule, we use either repetition of a 16-bit key (for n K = 16), 5 independent 16-bit subkeys (for n K = 80), or a sequence of low 16-bits from a shifted 32-bit key (for n K = 32).…”
Section: Preliminariesmentioning
confidence: 99%
“…If we have access to a large number of P-C pairs, algebraic cryptanalysis can be combined with differential techniques [1,5,10]. The attack is based on a selected differential characteristic, which holds with high probability.…”
Section: Introductionmentioning
confidence: 99%
“…This generic key recovery framework for differential cryptanalysis was first proposed by Albrecht and Cid in [2], where it was applied to the block cipher PRESENT (and was further used in followup publications such as [3,22]). Albrecht and Cid used algebraic techniques to enhance differential cryptanalysis, and specifically, devised Attack-C which formulates the sub-cipher as a system of non-linear equations, and solves it using algebraic tools (e.g., SAGE [20]).…”
Section: Introductionmentioning
confidence: 99%