A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multidimensional Linear Cryptanalysis of Reduced Round Serpent
[chapter]
Lecture Notes in Computer Science
Then we apply these new techniques to four rounds of the block cipher Serpent and show that the multidimensional approach is more effective in recovering key bits correctly than the previous methods that ...
Various authors have previously presented different approaches how to exploit multiple linear approximations to enhance linear cryptanalysis. ...
We also applied our method to the 4-round version of block cipher Serpent that was studied in [8] using Biryukov's method [4] . ...
doi:10.1007/978-3-540-70500-0_15
fatcat:j7pe3ng6yjatbe7vpvuno3bnly
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis
[chapter]
2011
Lecture Notes in Computer Science
This paper also simulates the experiments of the improved Algorithm 2 in multidimensional linear cryptanalysis on 5-round Serpent. ...
In FSE'09 Hermelin et al. introduced the Algorithm 2 of multidimensional linear cryptanalysis. ...
The linear cryptanalysis can reach 11-round reduced Serpent by Algorithm 2 of Matsui based on the 9-round linear approximation [1, 7, 5] . ...
doi:10.1007/978-3-642-22497-3_5
fatcat:y2hjtudmgzfffa2wky5kjmrim4
Differential Factors: Improved Attacks on SERPENT
[chapter]
2015
Lecture Notes in Computer Science
Existence of differential factors can reduce the time complexity of differential attacks and as an example we show that the 10, 11, and 12-round differential-linear attacks of Dunkelman et al. on Serpent ...
can actually be performed with time complexities reduced by a factor of 4, 4, and 8, respectively. ...
s differential-linear attacks on Serpent and the attacked round keys cannot be fully recovered in these attacks. ...
doi:10.1007/978-3-319-16363-5_5
fatcat:w2jr4jh5xvdphd6j3ooinavk54
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis
[chapter]
2013
Lecture Notes in Computer Science
We demonstrate that the Wrong-Key Randomization Hypothesis is not entirely valid for attacks on reduced-round Serpent which rely on linear cryptanalysis or a variant thereof, and survey the effects of ...
known-plaintext attack on reduced-round Serpent so far. ...
-round Serpent-256. ...
doi:10.1007/978-3-642-45239-0_8
fatcat:ltfm34jhyvezljuocsemqwfaei
On Multidimensional Linear Cryptanalysis
[chapter]
2010
Lecture Notes in Computer Science
Known as multidimensional linear cryptanalysis, the requirement for statistical independence is relaxed. In this paper we study the multidimensional Alg. 1 of Hermelin et al.. ...
We apply the results on 4-and 9-round Serpent and show that Hermelin et al. actually provided a formal model for the hypothesis of Biryukov et al. in practice, and this model is now much more practical ...
Acknowledgements We thank Joo Yeon Cho for providing the linear approximations used in [10] . ...
doi:10.1007/978-3-642-14081-5_3
fatcat:gzbyd5v5bndrbgp5lhzpw3on3i
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
[chapter]
2009
Lecture Notes in Computer Science
We present evidence that it is theoretically possible to reduce the data complexity of the linear attack against 10 round Serpent by factor of 2 20 when multiple approximations are used. ...
We show that the data complexity of the attack can be reduced significantly by our method even when the linear hull effect is present. ...
., [6] presented experimental results on the linear attack of Biryukov, et al., against reduced round Serpent. ...
doi:10.1007/978-3-642-00730-9_24
fatcat:eedgk6rjprf6hf5ezivx4ognjq
Differential-Linear Cryptanalysis Revisited
[chapter]
2015
Lecture Notes in Computer Science
method of differential-linear cryptanalysis. ...
In this paper we take the natural step and apply the theoretical link between linear and differential cryptanalysis to differential-linear cryptanalysis to develop a concise theory of this method. ...
Differential-linear cryptanalysis [6, 22] which has been applied to many ciphers, remains with the multidimensional linear cryptanalysis [35, 36] the most powerful attack on the Serpent cipher [1] ...
doi:10.1007/978-3-662-46706-0_21
fatcat:ilzzpq3kzzhdnicu5he4o43xhe
Differential-Linear Cryptanalysis Revisited
2016
Journal of Cryptology
method of differential-linear cryptanalysis. ...
In this paper we take the natural step and apply the theoretical link between linear and differential cryptanalysis to differential-linear cryptanalysis to develop a concise theory of this method. ...
Differential-linear cryptanalysis [6, 22] which has been applied to many ciphers, remains with the multidimensional linear cryptanalysis [35, 36] the most powerful attack on the Serpent cipher [1] ...
doi:10.1007/s00145-016-9237-5
fatcat:bkw6ht57djf6binlyqgxgilvpy
Multidimensional Linear Cryptanalysis
2018
Journal of Cryptology
We also test the theory in practice with reduced round Serpent. Based on our results, we give recommendations on how multidimensional linear cryptanalysis should be used. ...
We also show how the data complexity of linear cryptanalysis on stream ciphers and block ciphers can be reduced by using multiple approximations. ...
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. ...
doi:10.1007/s00145-018-9308-x
fatcat:6mg4rjoyu5coxlrwvicfrxnfji
Linear Cryptanalysis of Reduced-Round PRESENT
[chapter]
2010
Lecture Notes in Computer Science
In this paper we analyze PRESENT by the multidimensional linear cryptanalysis method. ...
We demonstrate our result by performing the linear attacks on reduced variants of PRESENT. ...
I am grateful to anonymous reviewers of Asiacrypt 2009 and CT-RSA 2010 for their valuable comments. ...
doi:10.1007/978-3-642-11925-5_21
fatcat:3lg4cpr3xbblvgumrwgpkdcfxy
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations
[chapter]
2017
Lecture Notes in Computer Science
A limitation of the LLR test statistic is that its application requires the full knowledge of the corresponding distribution. ...
for all values of the success probability. ...
A reduced round linear cryptanalysis of SERPENT was earlier reported in [8] using a set of linear approximations [7] . ...
doi:10.1007/978-3-319-61273-7_14
fatcat:due5d454cvdd5gakzfjidkp66a
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
[chapter]
2009
Lecture Notes in Computer Science
Linear Cryptanalysis with Applications on Reduced Round Serpent" Joo Yeon Cho, Miia Hermelin and Kaisa Nyberg "Almost fully optimized infinite classes of Boolean functions resistant to (fast) algebraic ...
cryptanalysis" Enes Pasalic "Higher Order Differential Attacks on Reduced-Round MISTY1" Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri and Takeshi Kawabata Invited Talk II (Chair : Kwanjo Kim) The Status ...
doi:10.1007/978-3-642-00730-9_1
fatcat:c34x5qiy7bevporyayxwsezowq
Integral Cryptanalysis of the Block Cipher E2
[article]
2014
arXiv
pre-print
6 rounds of E2. ...
In this paper, we focus on the key-recovery attacks on reduced-round E2-128/192 taking both IT and FT functions in consideration with integral cryptanalysis. ...
Several extensions of linear cryptanalysis have been introduced so far, such as multiple linear approximations cryptanalysis [12] and multidimensional linear cryptanalysis [13] . ...
arXiv:1405.6483v2
fatcat:havevott5nadxegtwbabuz67gy
Physical Layer Security in Underlay CCRNs with Fixed Transmit Power
2015
KSII Transactions on Internet and Information Systems
In this paper, we focus on the security evaluation of ARIA block cipher against the recent zero-correlation linear cryptanalysis. ...
We first introduce some 4-round linear approximations of ARIA with zero-correlation, and then present some key-recovery attacks on 6/7-round ARIA-128/256 with the Partial-sum technique and FFT technique ...
They are the first zero-correlation linear attacks on reduced-round ARIA. The paper is organized as follows. ...
doi:10.3837/tiis.2015.01.015
fatcat:qmq57frzmzecdaz25qy6ubpzqu
Improved Linear Cryptanalysis of Reduced-Round MIBS
[chapter]
2014
Lecture Notes in Computer Science
s multidimensional linear cryptanalysis. We also use Nguyen et al.'s technique to have less time complexity. ...
Bay et al. provided the first impossible differential, differential and linear cryptanalyses of MIBS. Their best attack was a linear attack on the 18-round MIBS-80. ...
Multidimensional Linear Cryptanalysis of Reduced-Round MIBS-80 In this section, we apply a 12-dimensional linear attack on the 19 rounds of MIBS-80 by using the convolution method [Her10] . → w (both ...
doi:10.1007/978-3-319-09843-2_16
fatcat:chuuraxgtjbxlkkorcupnyjd5u
« Previous
Showing results 1 — 15 out of 35 results