Abstract
The application of the concept of linear cryptanalysis to the domain of key-less primitives is largely an open problem. In this paper we, for the first time, propose a model in which its application is meaningful for distinguishing block ciphers.
Combining our model with ideas from message modification and rebound-like approaches, we initiate a study of cryptographic primitives with respect to this new attack vector and choose the lightweight block cipher PRESENT as an example target. This leads to known-key distinguishers over up to 27 rounds, whereas the best previous result is up to 18 rounds in the chosen-key model.
Combining our model with ideas from message modification and rebound-like approaches, we initiate a study of cryptographic primitives with respect to this new attack vector and choose the lightweight block cipher PRESENT as an example target. This leads to known-key distinguishers over up to 27 rounds, whereas the best previous result is up to 18 rounds in the chosen-key model.
Original language | English |
---|---|
Title of host publication | Revised Selected Papers of the 22nd International Workshop on Fast Software Encryption (FSE 2015) |
Editors | Gregor Leander |
Publisher | Springer |
Publication date | 2015 |
Pages | 217-240 |
ISBN (Print) | 978-3-662-48115-8 |
ISBN (Electronic) | 978-3-662-48116-5 |
DOIs | |
Publication status | Published - 2015 |
Event | 22nd International Workshop on Fast Software Encryption (FSE 2015) - Istanbul, Turkey Duration: 8 Mar 2015 → 11 Mar 2015 Conference number: 22 http://www.lightsec.org/fse2015/ |
Workshop
Workshop | 22nd International Workshop on Fast Software Encryption (FSE 2015) |
---|---|
Number | 22 |
Country/Territory | Turkey |
City | Istanbul |
Period | 08/03/2015 → 11/03/2015 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 9054 |
ISSN | 0302-9743 |
Keywords
- Hash function
- Block cipher
- Linear cryptanalysis
- Distinguisher
- PRESENT