Key guessing strategies for linear key-schedule algorithms in rectangle attacks
From MaRDI portal
Publication:2170076
DOI10.1007/978-3-031-07082-2_1zbMATH Open1496.94041OpenAlexW3186536863MaRDI QIDQ2170076FDOQ2170076
Lingyue Qin, Siwei Sun, Xiaoyang Dong, Xiaoyun Wang
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_1
Recommendations
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Generic framework for key-guessing improvements
- A general framework for the related-key linear attack against block ciphers with linear key schedules
- Information Security and Privacy
Cites Work
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- DLCT: a new tool for differential-linear cryptanalysis
- GIFT: A Small Present
- Differential cryptanalysis of DES-like cryptosystems
- On probability of success in linear and differential cryptanalysis
- Serpent: A New Block Cipher Proposal
- Title not available (Why is that?)
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
- The Return of the Cryptographic Boomerang
- Related-Key Boomerang and Rectangle Attacks
- Advances in Cryptology - CRYPTO 2003
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Differential-linear cryptanalysis from an algebraic perspective
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Differential-Linear Attack on 12-Round Serpent
- Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Observations on the SIMON Block Cipher Family
- New Cryptanalytic Results on IDEA
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Boomerang Connectivity Table: a new cryptanalysis tool
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- Forkcipher: a new primitive for authenticated encryption of very short messages
- Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
- Sieve-in-the-Middle: Improved MITM Attacks
- Improved (related-key) differential cryptanalysis on GIFT
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Automatic Search for Differential Trails in ARX Ciphers
- Related-Key Impossible-Differential Attack on Reduced-Round Skinny
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Making the impossible possible
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- Improving key-recovery in linear attacks: application to 28-round PRESENT
- The retracing boomerang attack
- Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
- Anomalies and vector space search: tools for S-box analysis
- Block cipher invariants as eigenvectors of correlation matrices
Cited In (12)
- Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- Differential cryptanalysis of round-reduced \texttt{SPEEDY} family
- Generic framework for key-guessing improvements
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- Improving the rectangle attack on GIFT-64
- A generic algorithm for efficient key recovery in differential attacks -- and its associated tool
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- Revisiting related-key boomerang attacks on AES using computer-aided tool
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
- Generalized boomerang connectivity table and improved cryptanalysis of GIFT
Uses Software
This page was built for publication: Key guessing strategies for linear key-schedule algorithms in rectangle attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170076)