In this paper we present a differential attack on the block cipher PP-1 which was designed at Poznan University of Technology. Complexity of the attack is smaller than that of brute force attack for every version of the cipher (for every block length). The attack is possible is spite of the fact that the S-box exhibits optimal security against the differential cryptanalysis. The attack is based on the fact that the design of the cipher S-box and permutation were constructed independently. The permutation operates on individual bits, and in the XOR profile table of S-box 1 bit to 1 bit transitions are possible. It allows constructing a simple one-round differential characteristic which is almost iterative with the probability 1.5 · 2-6. By 9...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
We present a framework that unifies several standard differential techniques. This unified view allo...
International audienceWe present a framework that unifies several standard differ-ential techniques....
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be ...
The rapid growth of the Internet of Things together with the increasing popularity of connected obje...
We present a new statistical cryptanalytic technique that we call improbable differential cryptanaly...
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably ...
International audienceWe present a framework that unifies several standard differ-ential techniques....
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
Block ciphers and their security are the main subjects of this work. In the first part it is descr...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
We present a framework that unifies several standard differential techniques. This unified view allo...
International audienceWe present a framework that unifies several standard differ-ential techniques....
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
In this document, I present my work in the field of symmetric cryptography during the period 2008-20...
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be ...
The rapid growth of the Internet of Things together with the increasing popularity of connected obje...
We present a new statistical cryptanalytic technique that we call improbable differential cryptanaly...
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably ...
International audienceWe present a framework that unifies several standard differ-ential techniques....
Resistance against differential cryptanalysis is an important design criteria for any modern block c...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
Block ciphers and their security are the main subjects of this work. In the first part it is descr...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data compl...