期刊文献+

Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers

原文传递
导出
摘要 Motivated by applications in advanced cryptographic protocols,research on arithmetizationoriented symmetric primitives has been rising in the field of symmetric cryptography in recent years.In this paper,the authors focus on on the collision attacks for a family of arithmetization-oriented symmetric ciphers GMiMCHash.The authors firstly enhance the algebraically controlled differential attacks proposed by introducing more variables.Then,combining algebraic attacks and differential attacks,the authors propose algebraic-differential attacks on GMi MCHash.This attack method is shown to be effective by experiments on toy versions of GMi MCHash.The authors further introduce some tricks to reduce the complexities of algebraic-differential attacks and improve the success probability of finding collisions.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第6期2681-2702,共22页 系统科学与复杂性学报(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No.61972393 the Climbing Program from Institute of Information Engineering CAS under Grant No.E3Z0221112。
  • 相关文献

参考文献3

二级参考文献16

  • 1Deepak KAPUR.A QUANTIFIER-ELIMINATION BASED HEURISTIC FOR AUTOMATICALLY GENERATING INDUCTIVE ASSERTIONS FOR PROGRAMS[J].Journal of Systems Science & Complexity,2006,19(3):307-330. 被引量:3
  • 2Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol, 1991, 4:3-72.
  • 3Biham E, Shamir A. Differential Cryptanalysis of the Data Encryption Standard. Berlin: Springer-Verlag, 1993.
  • 4Matsui M. Linear cryptanalysis method for DES cipher. In: Helleseth T. ed. Advances in Cryptology Eurocrypt 1993. LNCS 765. Berlin: Springer-Verlag, 1993. 386-397.
  • 5Courtois N T, Piepryyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng Y L, ed. Advances in Cryptology ASIACRYPT 2002, LNCS 2501. Berlin: Springer-Verlag, 2002. 267-287.
  • 6Albrecht M, Cid C. Algebraic techniques in differential cryptanalysis. In: Fast Software Encryption FSE 2009, LNCS 5665. Berlin: Springer-Verlag, 2009. 193-208.
  • 7Orr D, Sebastiaan I, Nathan K. A differential-linear attack on 12-round Serpent. In: Progress in Cryptology Indocrypt 2008, LNCS 5365. Berlin: Springer-Verlag, 2008. 308-321.
  • 8Anderson R J, Biham E, Knudsen L R. Serpent: A proposal for the Advanced Encryption Standard. Available at: http://www.cs.technion.ac.il/biham/Reports/Serpent.
  • 9NIST. A request for candidate algorithm nominations for the AES. Available online at http://www.nist.gov/aes/.
  • 10Biham E, Dunkelman O, Keller N. The rectangle attack-rectangling the Serpent. In: Pfitzmann B, ed. Advances in Cryptology Eurocrypt 2001, LNCS 2045. Berlin: Springer-Verlag, 2001. 341-357.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部