Invariant Hopping Attacks on Block Ciphers

02/08/2020
by   Nicolas T. Courtois, et al.
0

Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is to look at non-linear polynomial invariants cf. Eurocrypt'95. Until recently, researchers have found extremely few such attacks, with some impossibility results. Eventually recent papers show how to construct polynomial invariant attacks for block ciphers, however many such results were of degree 2. In this paper we propose a new incremental methodology for constructing high degree polynomial invariant attacks on block ciphers. A trivial attack on one cipher setup will be transposed to show the existence of a more advanced attack on a stronger cipher in several steps. The key tool is the manipulation of the roots of the so called Fundamental Equation. Examples are constructed with an old historical block cipher T-310.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/07/2019

Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher

One of the major open problems in symmetric cryptanalysis is to discover...
research
05/12/2019

Lack of Unique Factorization as a Tool in Block Cipher Cryptanalysis

Linear (or differential) cryptanalysis may seem dull topics for a mathem...
research
12/14/2021

INRU: A Quasigroup Based Lightweight Block Cipher

In this paper, we propose a quasigroup based block cipher design. The ro...
research
03/19/2021

Low differentially uniform permutations from Dobbertin APN function over 𝔽_2^n

Block ciphers use S-boxes to create confusion in the cryptosystems. Such...
research
01/09/2017

Semialgebraic Invariant Synthesis for the Kannan-Lipton Orbit Problem

The Orbit Problem consists of determining, given a linear transformation...
research
03/22/2022

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network

Farfalle is a permutation-based pseudo-random function which has been pr...
research
01/17/2022

Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium

Cube attack is one powerful method in the cryptanalysis of NFSR-based ci...

Please sign up or login with your details

Forgot password? Click here to reset