Counting equations in algebraic attacks on block ciphers

被引:0
|
作者
Lars R. Knudsen
Charlotte V. Miolane
机构
[1] Technical University of Denmark,Department of Mathematics
关键词
Cryptology; Block ciphers; Algebraic attacks; XL; AES;
D O I
暂无
中图分类号
学科分类号
摘要
This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block cipher. Our results are applied to the AES and to a variant of the AES, and the exact numbers of linearly independent equations in the two sets that one can generate by multiplication of an initial set of equations are given. Our results also indicate, in a novel way, that the AES is not vulnerable to the algebraic attacks as defined here.
引用
收藏
页码:127 / 135
页数:8
相关论文
共 50 条
  • [41] SQUARE attack on block ciphers with low algebraic degree
    Sun Bing
    Li RuiLin
    Qu LongJiang
    Li Chao
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 1988 - 1995
  • [42] DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS
    Denisov, O., V
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (48): : 43 - 62
  • [43] Further Analysis of Block Ciphers against Timing Attacks
    LI Wei~ 1
    2. State Key Laboratory of Modern Communications
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1629 - 1632
  • [44] Attacks of simple block ciphers via efficient heuristics
    Nalini, N.
    Rao, G. Raghavendra
    INFORMATION SCIENCES, 2007, 177 (12) : 2553 - 2569
  • [45] Systematic Construction of Nonlinear Product Attacks on Block Ciphers
    Courtois, Nicolas T.
    Abbondati, Matteo
    Ratoanina, Hamy
    Grajek, Marek
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 20 - 51
  • [46] Impossible differential attacks on the SKINNY family of block ciphers
    Yang, Dong
    Qi, Wen-Feng
    Chen, Hua-Jin
    IET INFORMATION SECURITY, 2017, 11 (06) : 377 - 385
  • [47] SAT Attacks on ARX Ciphers with Automated Equations Generation
    Andrzejczak, Michal
    Dudzic, Wladyslaw
    INFOCOMMUNICATIONS JOURNAL, 2019, 11 (04): : 2 - 7
  • [48] Cryptanalysis of block ciphers with overdefined systems of equations
    Courtois, NT
    Pieprzyk, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 267 - 287
  • [49] Output Prediction Attacks on Block Ciphers Using Deep Learning
    Kimura, Hayato
    Emura, Keita
    Isobe, Takanori
    Ito, Ryoma
    Ogawa, Kazuto
    Ohigashi, Toshihiro
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 248 - 276
  • [50] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation
    Saha, Sayandeep
    Bag, Arnab
    Roy, Debapriya Basu
    Patranabis, Sikhar
    Mukhopadhyay, Debdeep
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 612 - 643