Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack whichmakes use of alternative operations.
Differential attacks: using alternative operations / Civino, Roberto; Blondeau, Céline; Sala, Massimiliano. - In: DESIGNS, CODES AND CRYPTOGRAPHY. - ISSN 0925-1022. - STAMPA. - 87:2-3(2019), pp. 225-247. [10.1007/s10623-018-0516-z]
Differential attacks: using alternative operations
Civino, Roberto;Sala, Massimiliano
2019-01-01
Abstract
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate how alternative operations interact with the layers of a substitution–permutation network and show how they influence the differential probabilities, when the difference taken into consideration is different from the usual bit-wise addition modulo two. Furthermore, we design a block cipher which appears to be secure with respect to classical differential cryptanalysis, but weaker with respect to our attack whichmakes use of alternative operations.File | Dimensione | Formato | |
---|---|---|---|
Civino2019_Article_DifferentialAttacksUsingAltern.pdf
Solo gestori archivio
Descrizione: articolo pubblicato
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
834.38 kB
Formato
Adobe PDF
|
834.38 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione