Lack of Unique Factorization as a Tool in Block Cipher Cryptanalysis

05/12/2019
by   Nicolas T. Courtois, et al.
0

Linear (or differential) cryptanalysis may seem dull topics for a mathematician: they are about super simple invariants characterized by say a word on n=64 bits with very few bits at 1, the space of possible attacks is small, and basic principles are trivial. In contract mathematics offers an infinitely rich world of possibilities. If so, why is that cryptographers have ever found so few attacks on block ciphers? In this paper we argue that black-box methods used so far to find attacks in symmetric cryptography are inadequate and we work with a more recent white-box algebraic methodology. Invariant attacks can be constructed explicitly through the study of roots of the so-called Fundamental Equation (FE). We also argue that certain properties of the ring of Boolean polynomials such as lack of unique factorization allow for a certain type of product construction attacks to flourish. As a proof of concept we show how to construct a complex and non-trivial attack where a polynomial of degree 7 is an invariant for any number of rounds for a complex block cipher.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/08/2020

Invariant Hopping Attacks on Block Ciphers

Block ciphers are in widespread use since the 1970s. Their iterated stru...
research
02/07/2019

Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher

One of the major open problems in symmetric cryptanalysis is to discover...
research
10/23/2020

Learn Robust Features via Orthogonal Multi-Path

It is now widely known that by adversarial attacks, clean images with in...
research
08/24/2019

A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties

The s-box plays the vital role of creating confusion between the ciphert...
research
03/19/2021

Low differentially uniform permutations from Dobbertin APN function over 𝔽_2^n

Block ciphers use S-boxes to create confusion in the cryptosystems. Such...
research
07/05/2023

A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher

In LFSR-based stream ciphers, the knowledge of the feedback equation of ...
research
05/26/2022

Block Ciphers Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knights Tour Chain

The protection of confidential information is a global issue and block e...

Please sign up or login with your details

Forgot password? Click here to reset