Differential cryptanalysis of DES-like cryptosystems

From MaRDI portal
Publication:807011

DOI10.1007/BF00630563zbMath0729.68017OpenAlexW1629301835WikidataQ55868749 ScholiaQ55868749MaRDI QIDQ807011

Adi Shamir, Eli Biham

Publication date: 1991

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/bf00630563



Related Items

On group rings and some of their applications to combinatorics and symmetric cryptography, New results on quantum boomerang attacks, Investigating rational perfect nonlinear functions, Differential spectra of a class of power permutations with Niho exponents, Characteristics of nonlinearity of vectorial functions over finite fields, An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros, Construction of highly nonlinear permutations on \(\mathbb{Z}_{2p}\) with differential uniformity at most 8, On the exceptionality of rational APN functions, P℘N functions, complete mappings and quasigroup difference sets, Further constructions and characterizations of generalized almost perfect nonlinear functions, An infinite family of 0-APN monomials with two parameters, Triplicate functions, FUTURE: a lightweight block cipher using an optimal diffusion matrix, Improved differential attack on round-reduced LEA, Cryptographic functions with interesting properties from CCZ-equivalence, Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs, Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128, Two classes of power mappings with boomerang uniformity 2, Unnamed Item, Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher, Generalized boomerang connectivity table and improved cryptanalysis of GIFT, Clustering effect of iterative differential and linear trails, RAMus- a new lightweight block cipher for RAM encryption, Optimizing rectangle attacks: a unified and generic framework for key recovery, Boomerang uniformity of some classes of functions over finite fields, Practical-time related-key attack on GOST with secret S-boxes, Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}, Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers, The \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\), Clustering effect in \textsc{Simon} and \textsc{Simeck}, The classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functions, On the equivalence between a new family of APN quadrinomials and the power APN functions, Automated key recovery attacks on round-reduced Orthros, Decomposition of Dillon's APN permutation with efficient hardware implementation, A class of power mappings with low boomerang uniformity, Weak subtweakeys in SKINNY, Monte Carlo tree search for automatic differential characteristics search: application to SPECK, Practical non-malleable codes from symmetric-key primitives in 2-split-state model, Related-key differential cryptanalysis of GMiMC used in post-quantum signatures, On CCZ-equivalence between the Bracken-Tan-Tan function and power functions, Differential experiments using parallel alternative operations, On a class of APN power functions over odd characteristic finite fields: their differential spectrum and \(c\)-differential properties, Unnamed Item, Unnamed Item, Known-Key Distinguishers for Some Block Ciphers, A new spatiotemporally chaotic cryptosystem and its security and performance analyses, The method of S-box construction, Some Results on the Known Classes of Quadratic APN Functions, Probability distributions of correlation and differentials in block ciphers, Algebraic Cryptanalysis of the Data Encryption Standard, Linear Cryptanalysis of Non Binary Ciphers, More constructions of differentially 4-uniform permutations on \(\mathbb {F}_{2^{2k}}\), Related-Key Differential-Linear Attacks on Reduced AES-192, Improved differential-linear attacks with applications to ARX ciphers, 3D: A Three-Dimensional Block Cipher, New Related-Key Boomerang Attacks on AES, Improved Bounds on Sizes of Generalized Caps in $AG(n,q)$, Side channel cryptanalysis of product ciphers, Heuristic algorithm for obtaining permutations with given cryptographic properties using a generalized construction, Feedback linearly extended discrete functions, Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties, Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions, Investigation of some cryptographic properties of the \(8 \times 8\) S-boxes created by quasigroups, A framework to optimize implementations of matrices, Non-monomial permutations with differential uniformity six, New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\), Can a differential attack work for an arbitrarily large number of rounds?, Another look at normal approximations in cryptanalysis, Algebraic nonlinearity and its applications to cryptography, New types of cryptanalytic attacks using related keys, Provable security for 13 round Skipjack-like structure, On some block ciphers and imprimitive groups, Characterization of almost perfect nonlinear functions in terms of subfunctions, Upper bound of the length of truncated impossible differentials for AES, Designing S-boxes based on 3-D four-wing autonomous chaotic system, The Missing Difference problem, and its applications to counter mode encryption, On a conjecture of differentially 8-uniform power functions, Zero-correlation attacks: statistical models independent of the number of approximations, A novel method of S-box design based on chaotic map and composition method, New observations on invariant subspace attack, On cross-correlation indicators of an S-box, Nonlinearities of S-boxes, Substitution-permutation networks resistant to differential and linear cryptanalysis, Differential cryptanalysis of Lucifer, On-line/off-line digital signatures, Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers, Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function, Bent and permutational properties of Budaghyan-Carlet hexanomials, Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity, On the degree of homogeneous bent functions, Secure image encryption algorithm design using a novel chaos based S-Box, Rigorous upper bounds on data complexities of block cipher cryptanalysis, On the relationships between perfect nonlinear functions and universal hash families, Some remarks on the TKIP key mixing function of IEEE 802.11i, More differentially 6-uniform power functions, A new large class of functions not APN infinitely often, Towards the optimality of Feistel ciphers with substitution-permutation functions, On the Walsh spectrum of a family of quadratic APN functions with five terms, Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited, On the differential and linear efficiency of balanced Feistel networks, A new construction of differentially 4-uniform \((n,n-1)\)-functions, Binomial differentially 4 uniform permutations with high nonlinearity, A method for designing strong S-Boxes based on chaotic Lorenz system, Differential fault analysis on SMS4 using a single fault, Analysis of \(3\)-line generalized Feistel networks with double SD-functions, Differential cryptanalysis of eight-round SEED, Four decades of research on bent functions, Constructions with high algebraic degree of differentially 4-uniform \((n, n - 1)\)-functions and differentially 8-uniform \((n, n - 2)\)-functions, Differential fault analysis on block cipher SEED, Some results concerning cryptographically significant mappings over \(\text{GF}(2^{n})\), Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier, Wave-shaped round functions and primitive groups, Variants of the AES key schedule for better truncated differential bounds, Differential attacks: using alternative operations, New commutative semifields defined by new PN multinomials, Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\), Non abelian bent functions, A chaos-based approach to the design of cryptographically secure substitutions, Cryptanalysis on a parallel keyed hash function based on chaotic maps, New links between nonlinearity and differential uniformity, On CCZ-equivalence, extended-affine equivalence, and function twisting, Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity, On immunity against Biham and Shamir's differential cryptanalysis, Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK, A methodology for differential-linear cryptanalysis and its applications, Differentially 4-uniform bijections by permuting the inverse function, Two-round iterative characteristics for linear cryptanalysis of modified DES with embedded parity checks, Counting and characterising functions with ``fast points for differential attacks, Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems, The differential spectrum of a ternary power mapping, New differentially 4-uniform permutations by modifying the inverse function on subfields, Antiderivative functions over \(\mathbb{F}_{2^n}\), Generic attacks with standard deviation analysis on a-Feistel schemes, On derivatives of polynomials over finite fields through integration, Classification of quadratic APN functions with coefficients in \(\mathbb{F}_2\) for dimensions up to 9, On an algorithm generating 2-to-1 APN functions and its applications to ``The big APN problem, Involutory differentially 4-uniform permutations from known constructions, Notions and relations for RKA-secure permutation and function families, A randomness test for block ciphers, A novel method for designing S-boxes based on chaotic maps, A method for designing dynamical S-boxes based on discretized chaotic map, Steganography of capacity required using modulo operator for embedding secret image, Results on rotation-symmetric S-boxes, A block cipher with dynamic S-boxes based on tent map, A note on some algebraic trapdoors for block ciphers, Evolutionary computation based cryptanalysis: a first study, On quadratic approximations in block ciphers, Group theoretic properties of Rijndael-like ciphers, The replacement of irreducible polynomial and affine mapping for the construction of a strong S-box, G-perfect nonlinear functions, Some results on the differential functions over finite fields, Constructing new APN functions from known ones, Swimming dynamics near a wall in a weakly elastic fluid, A new characterization of group action-based perfect nonlinearity, New criteria for linear maps in AES-like ciphers, Highly nonlinear mappings, Boomerang uniformity of normalized permutation polynomials of low degree, Provable security against a differential attack, Improving the strict avalanche characteristics of cryptographic functions, Connections among nonlinearity, avalanche and correlation immunity, Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications, Invariants for EA- and CCZ-equivalence of APN and AB functions, Image encryption using \(q\)-deformed logistic map, Creation of S-box based on a hierarchy of Julia sets: image encryption approach, A note on APN permutations in even dimension, Deciding EA-equivalence via invariants, Differential and boomerang spectrums of some power permutations, The \textit{crooked} property, A further study of quadratic APN permutations in dimension nine, The \(t\)-wise independence of substitution-permutation networks, The design of composite permutations with applications to DES-like S-boxes, Projective aspects of the AES inversion, Survey on recent trends towards generalized differential and boomerang uniformities, On a conjecture on APN permutations, Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers, Analysis of minimum numbers of linearly active \(S\)-boxes of a class of generalized Feistel block ciphers, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, Solving \(X^{2^{3n} + 2^{2n} + 2^n - 1} + (X + 1)^{2^{3n} + 2^{2n} + 2^n - 1} = b\) in \(\mathbb{F}_{2^{4 n}}\) and an alternative proof of a conjecture on the differential spectrum of the related monomial functions, Key guessing strategies for linear key-schedule algorithms in rectangle attacks, A note on the differential spectrum of a differentially 4-uniform power function, Higher order differentiation over finite fields with applications to generalising the cube attack, Automatic tool for searching for differential characteristics in ARX ciphers and applications, Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction, If a generalised butterfly is APN then it operates on 6 bits, Unicyclic strong permutations, On relations between CCZ- and EA-equivalences, Differential uniformity of the composition of two functions, Quantum attacks on some Feistel block ciphers, Security analysis of SIMECK block cipher against related-key impossible differential, Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE, More low differential uniformity permutations over \(\mathbb{F}_{2^{2 k}}\) with \(k\) odd, On equivalence between known families of quadratic APN functions, On EA-equivalence of certain permutations to power mappings, Accurate estimates of the data complexity and success probability for various cryptanalyses, On unbalanced feistel networks with contracting MDS diffusion, CCZ-equivalence of bent vectorial functions and related constructions, Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions, Boomerang uniformity of popular S-box constructions, A note on complete polynomials over finite fields and their applications in cryptography, Security of the SMS4 block cipher against differential cryptanalysis, Impossible differential attacks on 13-round CLEFIA-128, The higher-order meet-in-the-middle attack and its application to the Camellia block cipher, On some connections between statistics and cryptology, More constructions of APN and differentially 4-uniform functions by concatenation, Permutation polynomials with low differential uniformity over finite fields of odd characteristic, On the differential uniformities of functions over finite fields, Subgroups of direct products of groups invariant under the action of permutations on factors, Some group-theoretical results on Feistel networks in a long-key scenario, A compress slide attack on the full GOST block cipher, Differential attack on nine rounds of the SEED block cipher, On properties of translation groups in the affine general linear group with applications to cryptography, On computational complexity of impossible differential cryptanalysis, Permutation polynomials and their differential properties over residue class rings, A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over \(\mathbb F_2n\), Generalized isotopic shift construction for APN functions, Differentially low uniform permutations from known 4-uniform functions, Low differentially uniform permutations from the Dobbertin APN function over \(\mathbb{F}_{2^n} \), Generalization of a class of APN binomials to Gold-like functions, On subspaces of Kloosterman zeros and permutations of the form \(L_1(x^{-1})+L_2(x)\), Rigid commutators and a normalizer chain, Boomerang uniformity of a class of power maps, New P\(c\)N and AP\(c\)N functions over finite fields, Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity, Constructing differentially 4-uniform permutations over \(\mathrm{GF}(2^{2m})\) from quadratic APN permutations over \(\mathrm{GF}(2^{2m+1})\), New generalized almost perfect nonlinear functions, Fast S-box security mechanism research based on the polymorphic cipher, A novel heuristic method for obtaining \(S\)-boxes, An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps, Affine equivalence in the AES round function, Regular subgroups with large intersection, Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations, Efficient cache attacks on AES, and countermeasures, The differential spectrum of a class of power functions over finite fields, Troika: a ternary cryptographic hash function, Differential spectra of a class of power permutations with characteristic 5, On the EA-classes of known APN functions in small dimensions, Cryptographic properties of small bijective S-boxes with respect to modular addition, On the boomerang uniformity of some permutation polynomials, Algebraic manipulation detection codes via highly nonlinear functions, Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}, Constructing new differentially 4-uniform permutations from known ones, The retracing boomerang attack, Further cryptographic properties of the multiplicative inverse function, Results on symmetric S-boxes constructed by concatenation of RSSBs, A chain of normalizers in the Sylow 2-subgroups of the symmetric group on \({\mathbf{2}}^n\) letters, SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations, Application based construction and optimization of substitution boxes over 2D mixed chaotic maps, Generalization of one method of a filter generator key recovery, On differential uniformity and nonlinearity of permutations on \(\mathbb{Z}_n\), Exceptional crooked functions, Several classes of PcN power functions over finite fields, Quadratic almost bent functions -- their partial characterization and design in the spectral domain, On relationship between the parameters characterizing nonlinearity and nonhomomorphy of vector spaces transformation, A note on the differential spectrum of a class of power mappings with Niho exponent, Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes, Cryptanalytic extraction of neural network models, The rebound attack and subspace distinguishers: application to Whirlpool, Improbable differential attacks on \texttt{PRESENT} using undisturbed bits, Integral characteristics by keyspace partitioning, On a generalization of substitution-permutation networks: the HADES design strategy, Permutation code encryption—New achievement based on path encryption, A public key cryptosystem based on data complexity under quantum environment, Toward the True Random Cipher: On Expected Linear Probability Values for SPNS with Randomly Selected S-Boxes, A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\), Security evaluation of MISTY structure with SPN round function, ON ISOTOPISMS OF COMMUTATIVE PRESEMIFIELDS AND CCZ-EQUIVALENCE OF FUNCTIONS, NON-BOOLEAN ALMOST PERFECT NONLINEAR FUNCTIONS ON NON-ABELIAN GROUPS, Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions, On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure, Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD, On the Diffusion Property of Iterated Functions, On the symmetric properties of APN functions, An algorithm for computing the upper bound for non-minimum weight differentials in 2-round LSX-ciphers, MATRIX REPRESENTATIONS OF BOOLEAN FUNCTIONS AND THEIR APPLICATION, Primitivity of PRESENT and other lightweight ciphers, Unnamed Item, The number of almost perfect nonlinear functions grows exponentially, On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions, On the infiniteness of a family of APN functions, Improved Top-Down Techniques in Differential Cryptanalysis, Analysis of NORX: Investigating Differential and Rotational Properties, Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation, On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2, Differential Attacks Against SPN: A Thorough Analysis, On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions, On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity, On Differential Uniformity of Maps that May Hide an Algebraic Trapdoor, Cryptanalysis of the AEAD and hash algorithm DryGASCON, On the \(c\)-differential spectrum of power functions over finite fields, Rapid solution of problems by quantum computation, Differential Cryptanalysis of Reduced-Round PRESENT, Simpira v2: A Family of Efficient Permutations Using the AES Round Function, Boomerang uniformity of power permutations and algebraic curves over \(\mathbb{F}_{2^n}\), A novel algebraic construction of strong S-boxes over double \(GF(2^7)\) structures and image protection, Completely characterizing a class of permutation quadrinomials, On the differential spectrum of a differentially 3-uniform power function, On full differential uniformity of permutations on the ring of integers modulo \(n\), New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions, A bit-vector differential model for the modular addition by a constant, Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions, Classifying 8-Bit to 8-Bit S-Boxes Based on Power Mappings from the Point of DDT and LAT Distributions, On Cryptographically Significant Mappings over GF(2 n ), Extending two families of bivariate APN functions, The differential spectrum and boomerang spectrum of a class of locally-APN functions, Efficient Chaotic Encryption Scheme with OFB Mode, Experimental Evaluation of Book Drawing Algorithms, New Applications of Differential Bounds of the SDS Structure, On Efficient Message Authentication Via Block Cipher Design Techniques, Perfect nonlinear S-boxes on the real-line, Best differential characteristic search of FEAL, The block cipher Square, Higher Order Differential Attack of a CAST Cipher, Fast Hashing and Stream Encryption with Panama, MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck, Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck, Note on Impossible Differential Attacks, CRITERIA FOR MARKOV BLOCK CIPHERS, DISTINGUISHING ATTACKS ON BLOCK CIPHERS BY DIFFERENTIALS OF TWO-BLOCK TEXTS, Doubly perfect nonlinear boolean permutations, Search for Related-Key Differential Characteristics in DES-Like Ciphers, Multiple Differential Cryptanalysis: Theory and Practice, Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function, Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher, Generation algorithm of a sort of P-permutations, Some functions with low differential uniformity, On Integral Distinguishers of Rijndael Family of Ciphers, Primitivity of the group of a cipher involving the action of the key-schedule, A new characterization of semi-bent and bent functions on finite fields, Distinguishing Distributions Using Chernoff Information, On 3-to-1 and Power APN S-Boxes, New Perfect Nonlinear Multinomials over F $_{p^{2k}}$ for Any Odd Prime p, On some probabilistic approximations for AES-like S-boxes, Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, Fast and Secure Chaos-Based Cryptosystem for Images, A construction of novel chaos base nonlinear component of block cipher, Related-Key Attack on Full-Round PICARO, Construction of Lightweight S-Boxes Using Feistel and MISTY Structures, Forgery Attacks on Round-Reduced ICEPOLE-128, Cryptanalysis of a new image alternate encryption algorithm based on chaotic map, Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher, О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках, Linear and differential cryptanalysis: Another viewpoint, The Differential Analysis of S-Functions, Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA, On the Security of the LAC Authenticated Encryption Algorithm, Attacking 9 and 10 Rounds of AES-256, New secondary constructions of differentially 4-uniform permutations over, Indices to measure the cryptographic strength of S-box, Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey, Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem, The State of the Art on the Conjecture of Exceptional APN Functions, An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis, Bent functions on a finite nonabelian group, Unnamed Item, Unnamed Item, Unnamed Item, Unnamed Item, Pseudorandom Functions: Three Decades Later, Improved differential fault analysis on PRESENT-80/128, On known constructions of APN and AB functions and their relation to each other



Cites Work