Counting equations in algebraic attacks on block ciphers

被引:0
|
作者
Lars R. Knudsen
Charlotte V. Miolane
机构
[1] Technical University of Denmark,Department of Mathematics
关键词
Cryptology; Block ciphers; Algebraic attacks; XL; AES;
D O I
暂无
中图分类号
学科分类号
摘要
This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block cipher. Our results are applied to the AES and to a variant of the AES, and the exact numbers of linearly independent equations in the two sets that one can generate by multiplication of an initial set of equations are given. Our results also indicate, in a novel way, that the AES is not vulnerable to the algebraic attacks as defined here.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [31] Block ciphers and systems of quadratic equations
    Biryukov, A
    De Cannière, C
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 274 - 289
  • [32] Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks
    Schrottenloher, Andre
    Stevens, Marc
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (03) : 146 - 183
  • [33] Algebraic attacks on a class of stream ciphers with unknown output function
    N. Rajesh Pillai
    S. S. Bedi
    Designs, Codes and Cryptography, 2013, 69 : 317 - 330
  • [34] Algebraic attacks on a class of stream ciphers with unknown output function
    Pillai, N. Rajesh
    Bedi, S. S.
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 317 - 330
  • [35] On the security of the LILI family of stream ciphers against algebraic attacks
    Al-Hinai, Sultan Zayid
    Dawson, Ed
    Henricksen, Matt
    Simpson, Leonie
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 11 - +
  • [36] Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    Hawkes, P
    Rose, GG
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 390 - 406
  • [37] Building Secure Block Ciphers on Generic Attacks Assumptions
    Patarin, Jacques
    Seurin, Yannick
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 66 - 81
  • [38] SQUARE attack on block ciphers with low algebraic degree
    Bing Sun
    RuiLin Li
    LongJiang Qu
    Chao Li
    Science China Information Sciences, 2010, 53 : 1988 - 1995
  • [39] SQUARE attack on block ciphers with low algebraic degree
    SUN Bing 1
    2 State Key Laboratory of Information Security
    3 National Mobile Communications Research Laboratory
    ScienceChina(InformationSciences), 2010, 53 (10) : 1988 - 1995
  • [40] New Cryptanalysis of Block Ciphers with Low Algebraic Degree
    Sun, Bing
    Qu, Longjiang
    Li, Chao
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 180 - 192