Aggregated differentials and cryptanalysis of PP-1 and GOST (Q2392055): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374941 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2883170 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Encryption Standard – AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic and Slide Attacks on KeeLoq / rank
 
Normal rank
Property / cites work
 
Property / cites work: Aggregated differentials and cryptanalysis of PP-1 and GOST / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Cyclic Double Block Length Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536653 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reflection Cryptanalysis of Some Ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484885 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the GOST Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2762766 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2741450 / rank
 
Normal rank

Latest revision as of 17:09, 6 July 2024

scientific article
Language Label Description Also known as
English
Aggregated differentials and cryptanalysis of PP-1 and GOST
scientific article

    Statements

    Aggregated differentials and cryptanalysis of PP-1 and GOST (English)
    0 references
    0 references
    0 references
    6 August 2013
    0 references
    Two ciphers: GOST (Russian government encryption standard) and PP-1 (designed at the Poznań University of Technology in Poland) have been claimed to be secure against differential cryptanalysis. The results of this paper refute this thesis. The possibility of breaking the GOST cipher was first noted by \textit{H.~Saki and T.~Kaneko} [Lect. Notes Comput. Sci. 2012, 315--323 (2001; Zbl 0981.94503)]. They have shown that the straightforward classical differential attack with one single differential characteristic is inefficient, but joining several differential one can obtain a tool for breaking this cipher. To this purpose, they have proposed the aggregated differential \((0x70707070,0x07070707)\). The authors show that the characteristic \((0x80700700,0x80700700)\) improves the result of Saki and Kaneko (op. cit.). They also show that this technique allows to break all known versions of PP-1 ciphers (cf. \textit{M.~Misztal} [Ann. UMCS, Informatica 11, No. 2, 9--24 (2012), \url{doi:10.2478/v10065-011-0006-7}]). A general theory of differential analysis can be found in [\textit{L. R.~Knudsen and M. J. B.~Robshaw}, The block cipher companion. Berlin: Springer (2011; Zbl 1243.68010)] .
    0 references
    Block ciphers
    0 references
    GOST
    0 references
    DES
    0 references
    PP-1
    0 references
    S-box design
    0 references
    differential cryptanalysis
    0 references
    sets of differentials
    0 references
    iterative differentials
    0 references
    0 references
    0 references

    Identifiers