A Framework for Automated Independent-Biclique Cryptanalysis

作者: Farzaneh Abed , Christian Forler , Eik List , Stefan Lucks , Jakob Wenzel

DOI: 10.1007/978-3-662-43933-3_29

关键词:

摘要: In this paper we introduce Janus, a software framework – written in Java which is built to provide assistance finding independent-biclique attacks for user-chosen set of parameters, e.g., the number rounds and dimension biclique. Given certain cipher, Janus not only finds an optimal bipartite graph (biclique), but also provides all-round carefree package matching-with-precomputation step, rendering found biclique, determining computational complexity attack.

参考文章(32)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger, Narrow-Bicliques: Cryptanalysis of Full IDEA Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 392- 410 ,(2012) , 10.1007/978-3-642-29011-4_24
Yanfeng Wang, Wenling Wu, Xiaoli Yu, Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher Information Security Practice and Experience. pp. 337- 352 ,(2012) , 10.1007/978-3-642-29101-2_23
Joan Daemen, Gilles Van Assche, Differential propagation analysis of keccak fast software encryption. pp. 422- 441 ,(2012) , 10.1007/978-3-642-34047-5_24
Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş, Biclique Cryptanalysis of TWINE cryptology and network security. pp. 43- 55 ,(2012) , 10.1007/978-3-642-35404-5_5
Deukjo Hong, Bonwook Koo, Daesung Kwon, Biclique Attack on the Full HIGHT Information Security and Cryptology - ICISC 2011. pp. 365- 374 ,(2012) , 10.1007/978-3-642-31912-9_24
Yu Sasaki, Kazumaro Aoki, Preimage Attacks on Step-Reduced MD5 Information Security and Privacy. pp. 282- 296 ,(2008) , 10.1007/978-3-540-70500-0_21
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, Biclique cryptanalysis of the full AES international conference on the theory and application of cryptology and information security. ,vol. 7073, pp. 344- 371 ,(2011) , 10.1007/978-3-642-25385-0_19