Differential attacks: using alternative operations

Tutkimustuotos: Lehtiartikkelivertaisarvioitu

Standard

Differential attacks : using alternative operations. / Civino, Roberto; Blondeau, Céline; Sala, Massimiliano.

julkaisussa: DESIGNS CODES AND CRYPTOGRAPHY, Vuosikerta 87, 12.07.2018, s. 225–247.

Tutkimustuotos: Lehtiartikkelivertaisarvioitu

Harvard

APA

Vancouver

Author

Civino, Roberto ; Blondeau, Céline ; Sala, Massimiliano. / Differential attacks : using alternative operations. Julkaisussa: DESIGNS CODES AND CRYPTOGRAPHY. 2018 ; Vuosikerta 87. Sivut 225–247.

Bibtex - Lataa

@article{bca64f51de49414a8d503d570a9353b6,
title = "Differential attacks: using alternative operations",
abstract = "Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack which makes use of alternative operations.",
keywords = "Alternative operations, Block ciphers, Differential cryptanalysis, Distinguisher",
author = "Roberto Civino and C{\'e}line Blondeau and Massimiliano Sala",
year = "2018",
month = "7",
day = "12",
doi = "10.1007/s10623-018-0516-z",
language = "English",
volume = "87",
pages = "225–247",
journal = "DESIGNS CODES AND CRYPTOGRAPHY",
issn = "0925-1022",
publisher = "Springer Netherlands",

}

RIS - Lataa

TY - JOUR

T1 - Differential attacks

T2 - using alternative operations

AU - Civino, Roberto

AU - Blondeau, Céline

AU - Sala, Massimiliano

PY - 2018/7/12

Y1 - 2018/7/12

N2 - Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack which makes use of alternative operations.

AB - Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack which makes use of alternative operations.

KW - Alternative operations

KW - Block ciphers

KW - Differential cryptanalysis

KW - Distinguisher

UR - http://www.scopus.com/inward/record.url?scp=85049800558&partnerID=8YFLogxK

U2 - 10.1007/s10623-018-0516-z

DO - 10.1007/s10623-018-0516-z

M3 - Article

VL - 87

SP - 225

EP - 247

JO - DESIGNS CODES AND CRYPTOGRAPHY

JF - DESIGNS CODES AND CRYPTOGRAPHY

SN - 0925-1022

ER -

ID: 27177040