Markov Ciphers and Differential Cryptanalysis
From MaRDI portal
Publication:4037447
DOI10.1007/3-540-46416-6_2zbMath0777.94013OpenAlexW1978695162MaRDI QIDQ4037447
Unnamed Author, Xuejia Lai, James L. Massey
Publication date: 18 May 1993
Published in: Advances in Cryptology — EUROCRYPT ’91 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-46416-6_2
differential cryptanalysischosen-plaintext attackMarkov ciphersProposed Encryption Standardsecret-key cipherssecurity of iterated block ciphers
Related Items (99)
A note on APN permutations in even dimension ⋮ Can a differential attack work for an arbitrarily large number of rounds? ⋮ New types of cryptanalytic attacks using related keys ⋮ Security evaluation of MISTY structure with SPN round function ⋮ The \(t\)-wise independence of substitution-permutation networks ⋮ Improved Differential Attacks on RC5 ⋮ Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ CIPHERTEXT-ONLY ATTACK ON AKELARRE ⋮ On some block ciphers and imprimitive groups ⋮ Capacity and Data Complexity in Multidimensional Linear Attack ⋮ Bug attacks ⋮ Projective aspects of the AES inversion ⋮ Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers ⋮ An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Differential cryptanalysis of Lucifer ⋮ Higher order differentiation over finite fields with applications to generalising the cube attack ⋮ Differential-linear cryptanalysis revisited ⋮ Automatic tool for searching for differential characteristics in ARX ciphers and applications ⋮ Improved Top-Down Techniques in Differential Cryptanalysis ⋮ Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher ⋮ Cryptanalysis of WIDEA ⋮ Differential Attacks Against SPN: A Thorough Analysis ⋮ Rotational analysis of ChaCha permutation ⋮ An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros ⋮ What is the effective key length for a block cipher: an attack on every practical block cipher ⋮ Improved differential attack on round-reduced LEA ⋮ Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy ⋮ Post-quantum security on the Lai-Massey scheme ⋮ Unnamed Item ⋮ Multidimensional spectral criterion for testing hypotheses on random permutations;Многомерный спектральный критерий для проверки гипотез о случайных подстановках ⋮ Clustering effect of iterative differential and linear trails ⋮ Differential cryptanalysis of round-reduced \texttt{SPEEDY} family ⋮ Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers ⋮ A geometric approach to linear cryptanalysis ⋮ Clustering effect in \textsc{Simon} and \textsc{Simeck} ⋮ Strong and tight security guarantees against integral distinguishers ⋮ Differential cryptanalysis in the fixed-key model ⋮ Monte Carlo tree search for automatic differential characteristics search: application to SPECK ⋮ On scatter properties of modular addition operation over imprimitivity systems of the translation group of the binary vector space ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ A bit-vector differential model for the modular addition by a constant ⋮ The phantom of differential characteristics ⋮ Subgroups of direct products of groups invariant under the action of permutations on factors ⋮ A Unified Approach to Related-Key Attacks ⋮ Transposition of AES Key Schedule ⋮ Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier ⋮ Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis ⋮ Cryptographic properties and application of a generalized unbalanced Feistel network structure ⋮ Rotational cryptanalysis on MAC algorithm chaskey ⋮ Best differential characteristic search of FEAL ⋮ The block cipher Square ⋮ Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor ⋮ On the Design and Security of RC2 ⋮ Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck ⋮ CRITERIA FOR MARKOV BLOCK CIPHERS ⋮ DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems ⋮ Multiple Differential Cryptanalysis: Theory and Practice ⋮ Quantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic map ⋮ Generic attacks on the Lai-Massey scheme ⋮ Packed Ciphertexts in LWE-Based Homomorphic Encryption ⋮ Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations ⋮ Mixing properties of operations defined on the set of \(n\)-dimensional vectors over a prime finite field ⋮ Distinguishing Distributions Using Chernoff Information ⋮ Bug Attacks ⋮ Improved key recovery attacks on reduced-round AES with practical data and memory complexities ⋮ Revisiting key schedule's diffusion in relation with round function's diffusion ⋮ Linear Cryptanalysis of Non Binary Ciphers ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Group theoretic properties of Rijndael-like ciphers ⋮ Fault Analysis Study of IDEA ⋮ Security of the Poseidon hash function against non-binary differential and linear attacks ⋮ Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher ⋮ Спектральный критерий для проверки гипотез о случайных подстановках ⋮ Разбиения на биграммах и марковость алгоритмов блочного шифрования ⋮ Подстановочные гомоморфизмы алгоритмов блочного шифрования и ${\otimes _{\mathbf{W}}}$-марковость ⋮ $\otimes_{\mathbf{W}}$-марковость XSL-алгоритмов блочного шифрования, связанная со свойствами слоев раундовой функции ⋮ Неабелевость группы наложения ключа и свойство $\otimes _{\mathbf{W}}$-марковости алгоритмов блочного шифрования ⋮ Вероятностные свойства статистических связей между входом и выходом марковского итеративного шифра с раундовыми отображениями на абелевых группах ⋮ Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure ⋮ Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ New criteria for linear maps in AES-like ciphers ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Provable security against a differential attack ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. ⋮ Side channel cryptanalysis of product ciphers ⋮ On the Role of Key Schedules in Attacks on Iterated Ciphers ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages ⋮ New attacks on IDEA with at least 6 rounds ⋮ JEROBOAM ⋮ Differential entropy analysis of the IDEA block cipher
This page was built for publication: Markov Ciphers and Differential Cryptanalysis