Filters








2 Hits in 2.0 sec

Resynchronization Attacks on WG and LEX [chapter]

Hongjun Wu, Bart Preneel
2006 Lecture Notes in Computer Science  
The resynchronization attack on WG and LEX shows that block cipher related attacks are powerful in analyzing non-linear resynchronization mechanisms.  ...  The resynchronization of WG is vulnerable to a differential attack. For WG with 80-bit key and 80-bit IV, 48 bits of the secret key can be recovered with about 2 31.3 chosen IVs .  ...  Special thanks go to Alex Biryukov for pointing out that the attack on LEX is slide attack and for helpful discussion.  ... 
doi:10.1007/11799313_27 fatcat:w2yklu5yrfdlxk5jcp5q7hncbe

Bit-Pattern Based Integral Attack [chapter]

Muhammad Reza Z'aba, Håvard Raddum, Matt Henricksen, Ed Dawson
Lecture Notes in Computer Science  
In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search.  ...  We use the byte leakage in LEX to construct a system of 21 equations in 17 variables. This is very close to the requirement for an efficient attack, i.e. a system containing 16 variables.  ...  Wu, H. & Preneel, B. (2006), Resynchronization Attacks on WG and LEX, in 'Fast Software Encryption: 13th International Workshop, FSE 2006', Vol. 4047, LNCS Springer, Heidelberg, pp. 422-432.  ... 
doi:10.1007/978-3-540-71039-4_23 fatcat:eujl3w4uz5dm3hlmd2mvo3qgxi