A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
DOI10.1007/978-3-642-22792-9_12zbMATH Open1287.94080OpenAlexW83473285MaRDI QIDQ5199192FDOQ5199192
Authors: Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
Publication date: 12 August 2011
Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_12
Recommendations
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- Security analysis of a cryptosystem based on subspace subcodes
- Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
- Practical cryptanalysis of \(k\)-ary \(C^\ast\)
- Attacking Letter Substitution Ciphers with Integer Programming
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Invariant subspaces in SPN block cipher
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
block cipherlinear cryptanalysissymmetric cryptographyinvariant subspace attacktruncated differentialsstatistical saturation attack
Cited In (65)
- Subgroups of direct products of groups invariant under the action of permutations on factors
- A geometric approach to linear cryptanalysis
- On the primitivity of the AES-128 key-schedule
- Mind the gap -- a closer look at the security of block ciphers against differential cryptanalysis
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives
- Slender-set differential cryptanalysis
- A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
- Constructing 8-bit permutations, 8-bit involutions and 8-bit orthomorphisms with almost optimal cryptographic parameters
- On the resilience of Even-Mansour to invariant permutations
- \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
- A new non-random property of 4.5-round PRINCE
- Can a differential attack work for an arbitrarily large number of rounds?
- Weak-key distinguishers for AES
- FUTURE: a lightweight block cipher using an optimal diffusion matrix
- On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation
- Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
- Cryptanalysis of the light-weight cipher A2U2
- A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
- Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures
- Integral characteristics by keyspace partitioning
- TNT: how to tweak a block cipher
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
- Влияние приводимости линейного преобразования на выбор раундовых констант
- Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers
- New slide attacks on almost self-similar ciphers
- Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
- Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
- Simpira v2: a family of efficient permutations using the AES round function
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
- Troika: a ternary cryptographic hash function
- Linear cryptanalysis of printcipher -- trails and samples everywhere
- Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
- Many weak keys for PRINTcipher: fast key recovery and countermeasures
- New observations on invariant subspace attack
- On classes of weak keys of generalized cryptosystem PRINT
- Characterization of mappings by the nonisometricity property
- On invariant subspaces in the Lai-Massey scheme and a primitivity reduction
- New representations of the AES key schedule
- Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette}
- Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX)
- On a generalization of substitution-permutation networks: the HADES design strategy
- Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
- The permutation group insight on the diffusion property of linear mappings
- Rotational differential-linear cryptanalysis revisited
- Cryptanalysis of full sprout
- A theoretical analysis of generalized invariants of bijective S-boxes
- Constructing and deconstructing intentional weaknesses in symmetric ciphers
- PRINTcipher: A Block Cipher for IC-Printing
- Improving the security and efficiency of block ciphers based on LS-designs
- Block cipher invariants as eigenvectors of correlation matrices
- A new criterion for avoiding the propagation of linear relations through an sbox
- An attack on 6 rounds of Khazad
- The phantom of differential characteristics
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Differential meet-in-the-middle cryptanalysis
- On a relationship between linear and differential characteristics of binary vector spaces mappings and diffusion characteristics over blocks of imprimitivity systems of translation group of the binary vector space
- ОБЗОР АТАК НА AES-128: К ПЯТНАДЦАТИЛЕТИЮ СТАНДАРТА AES
- Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
- Improved differential meet-in-the-middle cryptanalysis
- Generalized Feistel ciphers for efficient prime field masking
- On permutations that break subspaces of specified dimensions
- New representations of the AES key schedule
- On the image of an affine subspace under the inverse function within a finite field
- On the multi-output filtering model and its applications
Uses Software
This page was built for publication: A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5199192)