Abstract
We present a framework that unifies several standard differential techniques. This unified view allows us to consider many, potentially all, output differences for a given input difference and to combine the information derived from them in an optimal way. We then propose a new attack that implicitly mounts several standard, truncated, impossible, improbable and possible future variants of differential attacks in parallel and hence allows to significantly improve upon known differential attacks using the same input difference. To demonstrate the viability of our techniques, we apply them to KATAN-32. In particular, our attack allows us to break 115 rounds of KATAN-32. For this, our attack exploits the non-uniformity of the difference distribution after 91 rounds which is 20 rounds more than the previously best known differential characteristic. © 2013 Springer-Verlag Berlin Heidelberg.
Original language | English |
---|---|
Title of host publication | Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers |
Publisher | Springer |
Publication date | 2013 |
Pages | 1-15 |
ISBN (Print) | 978-3-642-35998-9 |
ISBN (Electronic) | 978-3-642-35999-6 |
DOIs | |
Publication status | Published - 2013 |
Event | 19th International Conference on Selected Areas in Cryptography - Windsor, Canada Duration: 15 Aug 2012 → 16 Aug 2012 Conference number: 19 |
Conference
Conference | 19th International Conference on Selected Areas in Cryptography |
---|---|
Number | 19 |
Country/Territory | Canada |
City | Windsor |
Period | 15/08/2012 → 16/08/2012 |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 7707 |
ISSN | 0302-9743 |
Keywords
- Lyapunov methods
- Security of data
- Cryptography