# Differential attacks: using alternative operations

Tutkimustuotos: Lehtiartikkeli › › vertaisarvioitu

### Standard

**Differential attacks : using alternative operations.** / Civino, Roberto; Blondeau, Céline; Sala, Massimiliano.

Tutkimustuotos: Lehtiartikkeli › › vertaisarvioitu

### Harvard

*DESIGNS CODES AND CRYPTOGRAPHY*, Vuosikerta. 87, Sivut 225–247. https://doi.org/10.1007/s10623-018-0516-z

### APA

*DESIGNS CODES AND CRYPTOGRAPHY*,

*87*, 225–247. https://doi.org/10.1007/s10623-018-0516-z

### Vancouver

### Author

### Bibtex - Lataa

}

### RIS - Lataa

TY - JOUR

T1 - Differential attacks

T2 - using alternative operations

AU - Civino, Roberto

AU - Blondeau, Céline

AU - Sala, Massimiliano

PY - 2018/7/12

Y1 - 2018/7/12

N2 - Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack which makes use of alternative operations.

AB - Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack which makes use of alternative operations.

KW - Alternative operations

KW - Block ciphers

KW - Differential cryptanalysis

KW - Distinguisher

UR - http://www.scopus.com/inward/record.url?scp=85049800558&partnerID=8YFLogxK

U2 - 10.1007/s10623-018-0516-z

DO - 10.1007/s10623-018-0516-z

M3 - Article

VL - 87

SP - 225

EP - 247

JO - DESIGNS CODES AND CRYPTOGRAPHY

JF - DESIGNS CODES AND CRYPTOGRAPHY

SN - 0925-1022

ER -

ID: 27177040