Filters








35 Hits in 2.5 sec

Multidimensional Linear Cryptanalysis of Reduced Round Serpent [chapter]

Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
Lecture Notes in Computer Science  
Then we apply these new techniques to four rounds of the block cipher Serpent and show that the multidimensional approach is more effective in recovering key bits correctly than the previous methods that  ...  Various authors have previously presented different approaches how to exploit multiple linear approximations to enhance linear cryptanalysis.  ...  We also applied our method to the 4-round version of block cipher Serpent that was studied in [8] using Biryukov's method [4] .  ... 
doi:10.1007/978-3-540-70500-0_15 fatcat:j7pe3ng6yjatbe7vpvuno3bnly

Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis [chapter]

Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang
2011 Lecture Notes in Computer Science  
This paper also simulates the experiments of the improved Algorithm 2 in multidimensional linear cryptanalysis on 5-round Serpent.  ...  In FSE'09 Hermelin et al. introduced the Algorithm 2 of multidimensional linear cryptanalysis.  ...  The linear cryptanalysis can reach 11-round reduced Serpent by Algorithm 2 of Matsui based on the 9-round linear approximation [1, 7, 5] .  ... 
doi:10.1007/978-3-642-22497-3_5 fatcat:y2hjtudmgzfffa2wky5kjmrim4

Differential Factors: Improved Attacks on SERPENT [chapter]

Cihangir Tezcan, Ferruh Özbudak
2015 Lecture Notes in Computer Science  
Existence of differential factors can reduce the time complexity of differential attacks and as an example we show that the 10, 11, and 12-round differential-linear attacks of Dunkelman et al. on Serpent  ...  can actually be performed with time complexities reduced by a factor of 4, 4, and 8, respectively.  ...  s differential-linear attacks on Serpent and the attacked round keys cannot be fully recovered in these attacks.  ... 
doi:10.1007/978-3-319-16363-5_5 fatcat:w2jr4jh5xvdphd6j3ooinavk54

Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis [chapter]

James McLaughlin, John A. Clark
2013 Lecture Notes in Computer Science  
We demonstrate that the Wrong-Key Randomization Hypothesis is not entirely valid for attacks on reduced-round Serpent which rely on linear cryptanalysis or a variant thereof, and survey the effects of  ...  known-plaintext attack on reduced-round Serpent so far.  ...  -round Serpent-256.  ... 
doi:10.1007/978-3-642-45239-0_8 fatcat:ltfm34jhyvezljuocsemqwfaei

On Multidimensional Linear Cryptanalysis [chapter]

Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
2010 Lecture Notes in Computer Science  
Known as multidimensional linear cryptanalysis, the requirement for statistical independence is relaxed. In this paper we study the multidimensional Alg. 1 of Hermelin et al..  ...  We apply the results on 4-and 9-round Serpent and show that Hermelin et al. actually provided a formal model for the hypothesis of Biryukov et al. in practice, and this model is now much more practical  ...  Acknowledgements We thank Joo Yeon Cho for providing the linear approximations used in [10] .  ... 
doi:10.1007/978-3-642-14081-5_3 fatcat:gzbyd5v5bndrbgp5lhzpw3on3i

A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent [chapter]

Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg
2009 Lecture Notes in Computer Science  
We present evidence that it is theoretically possible to reduce the data complexity of the linear attack against 10 round Serpent by factor of 2 20 when multiple approximations are used.  ...  We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present.  ...  ., [6] presented experimental results on the linear attack of Biryukov, et al., against reduced round Serpent.  ... 
doi:10.1007/978-3-642-00730-9_24 fatcat:eedgk6rjprf6hf5ezivx4ognjq

Differential-Linear Cryptanalysis Revisited [chapter]

Céline Blondeau, Gregor Leander, Kaisa Nyberg
2015 Lecture Notes in Computer Science  
method of differential-linear cryptanalysis.  ...  In this paper we take the natural step and apply the theoretical link between linear and differential cryptanalysis to differential-linear cryptanalysis to develop a concise theory of this method.  ...  Differential-linear cryptanalysis [6, 22] which has been applied to many ciphers, remains with the multidimensional linear cryptanalysis [35, 36] the most powerful attack on the Serpent cipher [1]  ... 
doi:10.1007/978-3-662-46706-0_21 fatcat:ilzzpq3kzzhdnicu5he4o43xhe

Differential-Linear Cryptanalysis Revisited

Céline Blondeau, Gregor Leander, Kaisa Nyberg
2016 Journal of Cryptology  
method of differential-linear cryptanalysis.  ...  In this paper we take the natural step and apply the theoretical link between linear and differential cryptanalysis to differential-linear cryptanalysis to develop a concise theory of this method.  ...  Differential-linear cryptanalysis [6, 22] which has been applied to many ciphers, remains with the multidimensional linear cryptanalysis [35, 36] the most powerful attack on the Serpent cipher [1]  ... 
doi:10.1007/s00145-016-9237-5 fatcat:bkw6ht57djf6binlyqgxgilvpy

Multidimensional Linear Cryptanalysis

Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
2018 Journal of Cryptology  
We also test the theory in practice with reduced round Serpent. Based on our results, we give recommendations on how multidimensional linear cryptanalysis should be used.  ...  We also show how the data complexity of linear cryptanalysis on stream ciphers and block ciphers can be reduced by using multiple approximations.  ...  Multidimensional Linear Cryptanalysis of Reduced Round Serpent. Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg.  ... 
doi:10.1007/s00145-018-9308-x fatcat:6mg4rjoyu5coxlrwvicfrxnfji

Linear Cryptanalysis of Reduced-Round PRESENT [chapter]

Joo Yeon Cho
2010 Lecture Notes in Computer Science  
In this paper we analyze PRESENT by the multidimensional linear cryptanalysis method.  ...  We demonstrate our result by performing the linear attacks on reduced variants of PRESENT.  ...  I am grateful to anonymous reviewers of Asiacrypt 2009 and CT-RSA 2010 for their valuable comments.  ... 
doi:10.1007/978-3-642-11925-5_21 fatcat:3lg4cpr3xbblvgumrwgpkdcfxy

A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations [chapter]

Subhabrata Samajder, Palash Sarkar
2017 Lecture Notes in Computer Science  
A limitation of the LLR test statistic is that its application requires the full knowledge of the corresponding distribution.  ...  for all values of the success probability.  ...  A reduced round linear cryptanalysis of SERPENT was earlier reported in [8] using a set of linear approximations [7] .  ... 
doi:10.1007/978-3-319-61273-7_14 fatcat:due5d454cvdd5gakzfjidkp66a

Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption [chapter]

Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
2009 Lecture Notes in Computer Science  
Linear Cryptanalysis with Applications on Reduced Round Serpent" Joo Yeon Cho, Miia Hermelin and Kaisa Nyberg "Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic  ...  cryptanalysis" Enes Pasalic "Higher Order Differential Attacks on Reduced-Round MISTY1" Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri and Takeshi Kawabata Invited Talk II (Chair : Kwanjo Kim) The Status  ... 
doi:10.1007/978-3-642-00730-9_1 fatcat:c34x5qiy7bevporyayxwsezowq

Integral Cryptanalysis of the Block Cipher E2 [article]

Wentan Yi, Shaozhen Chen
2014 arXiv   pre-print
6 rounds of E2.  ...  In this paper, we focus on the key-recovery attacks on reduced-round E2-128/192 taking both IT and FT functions in consideration with integral cryptanalysis.  ...  Several extensions of linear cryptanalysis have been introduced so far, such as multiple linear approximations cryptanalysis [12] and multidimensional linear cryptanalysis [13] .  ... 
arXiv:1405.6483v2 fatcat:havevott5nadxegtwbabuz67gy

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

2015 KSII Transactions on Internet and Information Systems  
In this paper, we focus on the security evaluation of ARIA block cipher against the recent zero-correlation linear cryptanalysis.  ...  We first introduce some 4-round linear approximations of ARIA with zero-correlation, and then present some key-recovery attacks on 6/7-round ARIA-128/256 with the Partial-sum technique and FFT technique  ...  They are the first zero-correlation linear attacks on reduced-round ARIA. The paper is organized as follows.  ... 
doi:10.3837/tiis.2015.01.015 fatcat:qmq57frzmzecdaz25qy6ubpzqu

Improved Linear Cryptanalysis of Reduced-Round MIBS [chapter]

Aslı Bay, Jialin Huang, Serge Vaudenay
2014 Lecture Notes in Computer Science  
s multidimensional linear cryptanalysis. We also use Nguyen et al.'s technique to have less time complexity.  ...  Bay et al. provided the first impossible differential, differential and linear cryptanalyses of MIBS. Their best attack was a linear attack on the 18-round MIBS-80.  ...  Multidimensional Linear Cryptanalysis of Reduced-Round MIBS-80 In this section, we apply a 12-dimensional linear attack on the 19 rounds of MIBS-80 by using the convolution method [Her10] . → w (both  ... 
doi:10.1007/978-3-319-09843-2_16 fatcat:chuuraxgtjbxlkkorcupnyjd5u
« Previous Showing results 1 — 15 out of 35 results