Counting equations in algebraic attacks on block ciphers

被引:0
|
作者
Lars R. Knudsen
Charlotte V. Miolane
机构
[1] Technical University of Denmark,Department of Mathematics
关键词
Cryptology; Block ciphers; Algebraic attacks; XL; AES;
D O I
暂无
中图分类号
学科分类号
摘要
This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block cipher. Our results are applied to the AES and to a variant of the AES, and the exact numbers of linearly independent equations in the two sets that one can generate by multiplication of an initial set of equations are given. Our results also indicate, in a novel way, that the AES is not vulnerable to the algebraic attacks as defined here.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [21] Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers
    Pometun, S. A.
    JOURNAL OF AUTOMATION AND INFORMATION SCIENCES, 2009, 41 (02) : 67 - 80
  • [22] Algebraic attacks on clock-controlled cascade ciphers
    Wong, Kenneth Koon-Ho
    Colbert, Bernard
    Batten, Lynn
    Al-Hinai, Sultan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 32 - +
  • [23] Open problems related to algebraic attacks on stream ciphers
    Canteaut, Anne
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 120 - 134
  • [24] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [25] A NOTE ON SOME ALGEBRAIC TRAPDOORS FOR BLOCK CIPHERS
    Calderini, Marco
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2018, 12 (03) : 515 - 524
  • [26] Integral Attacks on Some Lightweight Block Ciphers
    Zhu, Shiqiang
    Wang, Gaoli
    He, Yu
    Qian, Haifeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (11) : 4502 - 4521
  • [27] Experimental statistical attacks on block and stream ciphers
    Doroshenko, S.
    Fionov, A.
    Lubkin, A.
    Monarev, V.
    Ryabko, B.
    Shokin, Yu. I.
    COMPUTATIONAL SCIENCE AND HIGH PERFORMANCE COMPUTING III, 2008, 101 : 155 - +
  • [28] Block ciphers sensitive to Grobner basis attacks
    Buchmann, J
    Pyshkin, A
    Weinmann, RP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 313 - 331
  • [29] Quantum attacks on some feistel block ciphers
    Dong, Xiaoyang
    Dong, Bingyou
    Wang, Xiaoyun
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1179 - 1203
  • [30] Quantum attacks on some feistel block ciphers
    Xiaoyang Dong
    Bingyou Dong
    Xiaoyun Wang
    Designs, Codes and Cryptography, 2020, 88 : 1179 - 1203