Algebraic Cryptanalysis of the Data Encryption Standard
From MaRDI portal
Publication:5447514
DOI10.1007/978-3-540-77272-9_10zbMath1154.94386MaRDI QIDQ5447514
Nicolas T. Courtois, Gregory V. Bard
Publication date: 7 March 2008
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77272-9_10
DES; Gröbner bases; block ciphers; algebraic cryptanalysis; SAT solvers; AES; logical cryptanalysis; ElimLin algorithm; s\(^{5}\)DES; solving overdefined and sparse systems of multivariate equations
68W30: Symbolic computation and algebraic computation
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
Related Items
Formulations of some bit switching functions in DES, Improved Meet-in-the-Middle Attacks on Reduced-Round DES, Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts, MaxMinMax problem and sparse equations over finite fields, Improved agreeing-gluing algorithm, Local reduction and the algebraic cryptanalysis of the block cipher GOST, Side-channel cryptographic attacks using pseudo-Boolean optimization, DRAT Proofs for XOR Reasoning, Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two, Algebraic Analysis of the Simon Block Cipher Family, Algebraic Attacks Using Binary Decision Diagrams, Practical Algebraic Attacks on the Hitag2 Stream Cipher, Algebraic and Slide Attacks on KeeLoq
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Differential cryptanalysis of DES-like cryptosystems
- Solving multiple right hand sides linear equations
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Algebraic and Slide Attacks on KeeLoq
- Communication Theory of Secrecy Systems*
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Analytical Characteristics of the DES
- Advanced Encryption Standard – AES
- Theory and Applications of Satisfiability Testing
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Algebraic Attacks on Combiners with Memory and Several Outputs
- Applications of SAT Solvers to Cryptanalysis of Hash Functions