Markov Ciphers and Differential Cryptanalysis

From MaRDI portal
Publication:4037447

DOI10.1007/3-540-46416-6_2zbMath0777.94013OpenAlexW1978695162MaRDI QIDQ4037447

Unnamed Author, Xuejia Lai, James L. Massey

Publication date: 18 May 1993

Published in: Advances in Cryptology — EUROCRYPT ’91 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-46416-6_2




Related Items (99)

A note on APN permutations in even dimensionCan a differential attack work for an arbitrarily large number of rounds?New types of cryptanalytic attacks using related keysSecurity evaluation of MISTY structure with SPN round functionThe \(t\)-wise independence of substitution-permutation networksImproved Differential Attacks on RC5Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESCIPHERTEXT-ONLY ATTACK ON AKELARREOn some block ciphers and imprimitive groupsCapacity and Data Complexity in Multidimensional Linear AttackBug attacksProjective aspects of the AES inversionComputing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphersAn algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphersA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisDifferential cryptanalysis of LuciferHigher order differentiation over finite fields with applications to generalising the cube attackDifferential-linear cryptanalysis revisitedAutomatic tool for searching for differential characteristics in ARX ciphers and applicationsImproved Top-Down Techniques in Differential CryptanalysisCryptanalysis of the Full 8.5-Round REESSE3+ Block CipherCryptanalysis of WIDEADifferential Attacks Against SPN: A Thorough AnalysisRotational analysis of ChaCha permutationAn efficient strategy to construct a better differential on multiple-branch-based designs: application to OrthrosWhat is the effective key length for a block cipher: an attack on every practical block cipherImproved differential attack on round-reduced LEASpeeding up MILP Aided Differential Characteristic Search with Matsui’s StrategyPost-quantum security on the Lai-Massey schemeUnnamed ItemMultidimensional spectral criterion for testing hypotheses on random permutations;Многомерный спектральный критерий для проверки гипотез о случайных подстановкахClustering effect of iterative differential and linear trailsDifferential cryptanalysis of round-reduced \texttt{SPEEDY} familyLayout graphs, random walks and the \(t\)-wise independence of SPN block ciphersA geometric approach to linear cryptanalysisClustering effect in \textsc{Simon} and \textsc{Simeck}Strong and tight security guarantees against integral distinguishersDifferential cryptanalysis in the fixed-key modelMonte Carlo tree search for automatic differential characteristics search: application to SPECKOn scatter properties of modular addition operation over imprimitivity systems of the translation group of the binary vector spaceNew differential bounds and division property of Lilliput: block cipher with extended generalized Feistel networkAccurate estimates of the data complexity and success probability for various cryptanalysesA bit-vector differential model for the modular addition by a constantThe phantom of differential characteristicsSubgroups of direct products of groups invariant under the action of permutations on factorsA Unified Approach to Related-Key AttacksTransposition of AES Key ScheduleAnalysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrierMind the gap -- a closer look at the security of block ciphers against differential cryptanalysisCryptographic properties and application of a generalized unbalanced Feistel network structureRotational cryptanalysis on MAC algorithm chaskeyBest differential characteristic search of FEALThe block cipher SquareFast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processorOn the Design and Security of RC2Automatic Search for the Best Trails in ARX: Application to Block Cipher SpeckCRITERIA FOR MARKOV BLOCK CIPHERSDISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTSA methodology for differential-linear cryptanalysis and its applicationsNon-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystemsMultiple Differential Cryptanalysis: Theory and PracticeQuantum-chaotic key distribution in optical networks: from secrecy to implementation with logistic mapGeneric attacks on the Lai-Massey schemePacked Ciphertexts in LWE-Based Homomorphic EncryptionUpper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformationsMixing properties of operations defined on the set of \(n\)-dimensional vectors over a prime finite fieldDistinguishing Distributions Using Chernoff InformationBug AttacksImproved key recovery attacks on reduced-round AES with practical data and memory complexitiesRevisiting key schedule's diffusion in relation with round function's diffusionLinear Cryptanalysis of Non Binary CiphersThe Delicate Issues of Addition with Respect to XOR DifferencesGroup theoretic properties of Rijndael-like ciphersFault Analysis Study of IDEASecurity of the Poseidon hash function against non-binary differential and linear attacksProvable Security against Impossible Differential Cryptanalysis Application to CS-CipherСпектральный критерий для проверки гипотез о случайных подстановкахРазбиения на биграммах и марковость алгоритмов блочного шифрованияПодстановочные гомоморфизмы алгоритмов блочного шифрования и ${\otimes _{\mathbf{W}}}$-марковость$\otimes_{\mathbf{W}}$-марковость XSL-алгоритмов блочного шифрования, связанная со свойствами слоев раундовой функцииНеабелевость группы наложения ключа и свойство $\otimes _{\mathbf{W}}$-марковости алгоритмов блочного шифрованияВероятностные свойства статистических связей между входом и выходом марковского итеративного шифра с раундовыми отображениями на абелевых группахBiased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEACryptographic Properties and Application of a Generalized Unbalanced Feistel Network StructureBagua: a NFSR-based stream cipher constructed following confusion and diffusion principlesWide Trail Design Strategy for Binary MixColumnsNew criteria for linear maps in AES-like ciphersUnnamed ItemUnnamed ItemProvable security against a differential attackMore accurate results on the provable security of AES against impossible differential cryptanalysisHow to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.Side channel cryptanalysis of product ciphersOn the Role of Key Schedules in Attacks on Iterated CiphersApplications of SAT Solvers in Cryptanalysis: Finding Weak Keys and PreimagesNew attacks on IDEA with at least 6 roundsJEROBOAMDifferential entropy analysis of the IDEA block cipher




This page was built for publication: Markov Ciphers and Differential Cryptanalysis