Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?

被引:3
作者
Courtois, Nicolas T. [1 ]
Quisquater, Jean-Jacques [2 ]
机构
[1] UCL, Gower St, London, England
[2] Catholic Univ Louvain, Louvain La Neuve, Belgium
来源
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020 | 2021年 / 12593卷
关键词
Feistel ciphers; Boolean functions; Multivariate polynomials; T-310; Generalized linear cryptanalysis; Polynomial invariants; Hidden polynomial problems; Annihilators; Markov ciphers; k-normality; Algebraic cryptanalysis; CRYPTANALYSIS; CIPHERS;
D O I
10.1007/978-3-030-68890-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Differential cryptanalysis is one of the oldest attacks on block ciphers. Can anything new be discovered on this topic? A related question is that of backdoors and hidden properties. There is substantial amount of research on how Boolean functions affect the security of ciphers, and comparatively, little research, on how block cipher wiring can be very special or abnormal. In this article we show a strong type of anomaly: where the complexity of a differential attack does not grow exponentially as the number of rounds increases. It will grow initially, and later will be lower bounded by a constant. At the end of the day the vulnerability is an ordinary single differential attack on the full state. It occurs due to the existence of a hidden polynomial invariant. We conjecture that this type of anomaly is not easily detectable if the attacker has limited resources.
引用
收藏
页码:157 / 181
页数:25
相关论文
共 53 条
  • [1] [Anonymous], 1980, REFER 11 KRYPT AN CH
  • [2] Bard GV, 2010, LECT NOTES COMPUT SC, V6498, P176, DOI 10.1007/978-3-642-17401-8_14
  • [3] BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
  • [4] BROWN L, 1990, LECT NOTES COMPUT SC, V434, P696
  • [5] The multiplicative complexity of 6-variable Boolean functions
    Calik, Cagdas
    Turan, Meltem Sonmez
    Peralta, Rene
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (01): : 93 - 107
  • [6] Normal Boolean functions
    Charpin, P
    [J]. JOURNAL OF COMPLEXITY, 2004, 20 (2-3) : 245 - 265
  • [7] Courtois N., 2012, CRYPTOLOGY EPRINT AR
  • [8] Courtois N, LONG EXTENDED VERSIO
  • [9] Courtois N, BEST DIFFERENTIAL CH
  • [10] Courtois N., 2011, IACR CRYPTOLOGY EPRI, V626