We propose a differential attack on tree-structured substitution-permutation networks. The number of chosen plaintexts required for the differential attack to succeed is called the complexity. Our main result is to show that the expected complexity of the attack is linear in the size of the network. This is the first rigorous result concerning the complexity of a differential attack for a general class of product ciphers. 1 Introduction Differential cryptanalysis [4] has been applied to a considerable number of block ciphers, with great success in most cases. The attack proceeds by finding a series of differences \Omega known as a characteristic, or a set of related of characteristics known as a differential , which then gives information ...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
We present a new statistical cryptanalytic technique that we call improbable differential cryptanaly...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensi...
Abstract. The mere number of various apparently different statistical attacks on block ciphers has r...
Although symmetric key primitives such as block ciphers are ubiquitously deployed throughout all cry...
18 pagesMany attacks on iterated block ciphers rely on statistical considerations using plaintext/ci...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
1 Preamble When we refer to "cryptanalysis", we usually think about its destructiv...
Differential Cryptanalysis (DC) is one of the oldest known attacks on block ciphers. DC is based on ...
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differe...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
We present a new statistical cryptanalytic technique that we call improbable differential cryptanaly...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
As a classic cryptanalytic method for block ciphers, hash functions and stream ciphers, many extensi...
Abstract. The mere number of various apparently different statistical attacks on block ciphers has r...
Although symmetric key primitives such as block ciphers are ubiquitously deployed throughout all cry...
18 pagesMany attacks on iterated block ciphers rely on statistical considerations using plaintext/ci...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
1 Preamble When we refer to "cryptanalysis", we usually think about its destructiv...
Differential Cryptanalysis (DC) is one of the oldest known attacks on block ciphers. DC is based on ...
At FSE 2009, Albrecht et al. proposed a new cryptanalytic method that combines algebraic and differe...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES ...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
This paper considers the security of iterated block ciphers against the differential cryptanalysis i...
We present a new statistical cryptanalytic technique that we call improbable differential cryptanaly...