Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

ALGEBRAIC DEGREE ESTIMATION OF BLOCK CIPHERS USING RANDOMIZED ALGORITHM; UPPER-BOUND INTEGRAL DISTINGUISHER.

google+
Views: 542                 

Author :  Haruhisa Kosuge and Hidema Tanaka

Affiliation :  National Defense Academy of Japan, Yokosuka, Japan

Country :  Japan

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  Vol 6, No 3/4, December, 2016

Abstract :


Integral attack is a powerful method to recover the secret key of block cipher by exploiting a characteristic that a set of outputs after several rounds encryption has ( integral distinguisher). Recently, Todo proposed a new algorithm to construct integral distinguisher with division property. However, the existence of integral distinguisher which holds in additional rounds can not be denied by the algorithm. On the contrary, we take an approach to obtain the number of rounds which integral distinguisher does not hold ( upper-bound integral distinguisher). The approach is based on algebraic degree estimation. We execute a random search for a term which has a degree equals the number of all inputted variables. We propose an algorithm and apply it to PRESENT and RECTANGLE. Then, we confirm that there exists no 8-round integral distinguisher in PRESENT and no 9-round integral distinguisher in RECTANGLE. From the facts, integral attack for more than 11-round and 13-round of PRESEN

Keyword :  Chosen plaintext attack, Integral attack, Algebraic normal form, Algebraic degree, PRESENT, RECTANGLE

Journal/ Proceedings Name :  International Journal on Cryptography and Information Security (IJCIS),

URL :  http://wireilla.com/papers/ijcis/V6N4/6416ijcis02.pdf

User Name : babu
Posted 07-01-2017 on 10:50:44 AEDT



Related Research Work

  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Metrics For Evaluating Alerts In Intrusion Detection Systems
  • Hybrid Cryptographic Technique Using Rsa Algorithm And Scheduling Concepts

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals