2011
DOI: 10.1007/978-3-642-21702-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Differential Cryptanalysis: Theory and Practice

Abstract: Abstract. Differential cryptanalysis is a well-known statistical attack on block ciphers. We present here a generalisation of this attack called multiple differential cryptanalysis. We study the data complexity, the time complexity and the success probability of such an attack and we experimentally validate our formulas on a reduced version of PRESENT. Finally, we propose a multiple differential cryptanalysis on 18-round PRESENT for both 80-bit and 128-bit master keys.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
85
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 62 publications
(85 citation statements)
references
References 21 publications
0
85
0
Order By: Relevance
“…Theoretical analysis of this method is done in [9]. Taking notations of the previous section, the scoring function is determined by A i=1 q i or equivalently by the value 1 − q 0 .…”
Section: The Sum-of-counters Scoring Functionmentioning
confidence: 99%
See 3 more Smart Citations
“…Theoretical analysis of this method is done in [9]. Taking notations of the previous section, the scoring function is determined by A i=1 q i or equivalently by the value 1 − q 0 .…”
Section: The Sum-of-counters Scoring Functionmentioning
confidence: 99%
“…In this setting the scores cannot be approximated by a Gaussian distribution and even Poisson approximation leads to pessimistic results. This has been explained in [9] where a formula is given to obtain a better estimate than using Poisson distribution. For more details please refer to [9].…”
Section: The Sum-of-counters Scoring Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…When more characteristics are used, an attacker obtains different lists of subkeys and has to combine them. This is the case, for instance, in multiple differential cryptanalysis [4] and multiple linear cryptanalysis [3]. Both types of cryptanalyses belong to the same family of so-called last-rounds attacks that consist in partially decrypting the available ciphertexts (e.g.…”
Section: Other Applicationsmentioning
confidence: 99%