Algebraic Techniques in Differential Cryptanalysis Revisited

作者: Meiqin Wang , Yue Sun , Nicky Mouha , Bart Preneel

DOI: 10.1007/978-3-642-22497-3_9

关键词:

摘要: At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differential cryptanalysis. They introduced three attacks, namely Attack A, B C. For they explain the time complexity is difficult to determine. The goal of Attacks C filter out wrong pairs then recover key. In this paper, we show does not provide an advantage over cryptanalysis for typical block ciphers, because it cannot be used any satisfy ciphertext differences. Furthermore, why provides no PRESENT. We verify our results PRESENT experimentally, using both PolyBoRi MiniSat. Our work helps understand which equations are important in differential-algebraic attack. Based on findings, present two attacks. Using first method, attack 15-round PRESENT-80 requires 259 chosen plaintexts has worstcase 273.79 equivalent encryptions. 14-round PRESENT-128 255 2112.83 Although these attacks have higher than their data lower.

参考文章(25)
Nicolas T Courtois, Willi Meier, Algebraic attacks on stream ciphers with linear feedback theory and application of cryptographic techniques. pp. 345- 359 ,(2003) , 10.1007/978-3-540-45146-4_11
Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret, Algebraic precomputations in differential and integral cryptanalysis international conference on information security and cryptology. ,vol. 6584, pp. 387- 403 ,(2010) , 10.1007/978-3-642-21518-6_27
Onur Özen, Kerem Varıcı, Cihangir Tezcan, Çelebi Kocair, Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT australasian conference on information security and privacy. ,vol. 5594, pp. 90- 107 ,(2009) , 10.1007/978-3-642-02620-1_7
Niklas Eén, Niklas Sörensson, An Extensible SAT-solver theory and applications of satisfiability testing. ,vol. 2919, pp. 502- 518 ,(2003) , 10.1007/978-3-540-24605-3_37
Eli Biham, Adi Shamir, Differential Cryptanalysis of the Full 16-Round DES international cryptology conference. pp. 487- 496 ,(1992) , 10.1007/978-1-4613-9314-6_5
Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun, Differential Cryptanalysis of Reduced-Round ICEBERG Progress in Cryptology - AFRICACRYPT 2012. pp. 155- 171 ,(2012) , 10.1007/978-3-642-31410-0_10
Martin Albrecht, Carlos Cid, Algebraic Techniques in Differential Cryptanalysis fast software encryption. pp. 193- 208 ,(2009) , 10.1007/978-3-642-03317-9_12
Nicolas T. Courtois, Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations international conference on the theory and application of cryptology and information security. pp. 267- 287 ,(2002) , 10.1007/3-540-36178-2_17
Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang, Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT cryptology and network security. ,vol. 5888, pp. 58- 75 ,(2009) , 10.1007/978-3-642-10433-6_5
Joo Yeon Cho, Linear cryptanalysis of reduced-round PRESENT the cryptographers track at the rsa conference. pp. 302- 317 ,(2010) , 10.1007/978-3-642-11925-5_21