2005
DOI: 10.1007/11506447_15
|View full text |Cite
|
Sign up to set email alerts
|

The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers

Abstract: Abstract. This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, to attacks such ciphers, clearly designed to render hopeless the main classical attacks ? Recently a lot of attention have been drawn to the existence of multivariate algebraic relations for AES (and other) S-boxes. Then, if the XSL-type algebraic attacks on block ciphers [11] are shown to work well, the answer would be posi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
63
0

Year Published

2005
2005
2007
2007

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(64 citation statements)
references
References 26 publications
(49 reference statements)
1
63
0
Order By: Relevance
“…However, as we show below, the set of such transformations generates the symmetric group on F. This leads us to consider the nature of what exactly is meant by "the group generated by a cipher", and we conclude the Section with some comments on this issue. We note that some similar ideas were discussed in [7].…”
Section: Introduction To the Group-theoretic Properties Of A Ciphersupporting
confidence: 54%
See 3 more Smart Citations
“…However, as we show below, the set of such transformations generates the symmetric group on F. This leads us to consider the nature of what exactly is meant by "the group generated by a cipher", and we conclude the Section with some comments on this issue. We note that some similar ideas were discussed in [7].…”
Section: Introduction To the Group-theoretic Properties Of A Ciphersupporting
confidence: 54%
“…However, the group we consider, S F , is generated by transformations closer to AES transformations than "inversion" and subkey addition considered separately. Moreover, Theorem 4.3.1 of [7], the analogous result to our Theorem 1, is incorrect.…”
Section: Groups Generated By Aes-like Transformationsmentioning
confidence: 79%
See 2 more Smart Citations
“…Another important mode is a so called 'hopping' or 'rolling' method described in [4,33]. In this case 16 bits of the plaintext are permanently fixed on both sides, and the attacker cannot hope get more than 2 16 known plaintexts. More information can be found in [4,5,6].…”
Section: Cipher Usagementioning
confidence: 99%