scholarly journals The 7-Round Subspace Trail-Based Impossible Differential Distinguisher of Midori-64

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Wenhao Liu ◽  
Yang Yang

This paper analyzes the subspace trail of Midori-64 and uses the propagation law and mutual relationship of the subspaces of Midori-64 to provide a 6-round Midori-64 subspace trail-based impossible differential key recovery attack. The data complexity of the attack is 2 54.6 chosen plaintexts, and the computational complexity is 2 58.2 lookup operations. Its overall complexity is less than that of the known 6-round truncated impossible differential distinguisher. This distinguisher is also applicable to Midori-128 with a secret S -box. Additionally, utilizing the properties of subspaces, we prove that a subspace trail-based impossible differential distinguisher of Midori-64 contains at most 7 rounds. This is 1 more than the upper bound of Midori-64’s truncated impossible differential distinguisher which is 6. According to the Hamming weights of the starting and ending subspaces, we classify all 7-round Midori-64 subspace trail-based impossible differential distinguishers into two types and they need 2 59.6 and 2 51.4 chosen plaintexts, respectively.

Author(s):  
Christoph Dobraunig ◽  
Maria Eichlseder ◽  
Daniel Kales ◽  
Florian Mendel

MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5. The security claim for MANTIS5 is resistance against “practical attacks”, defined as related-tweak attacks with data complexity 2d less than 230 chosen plaintexts (or 240 known plaintexts), and computational complexity at most 2126−d. We present a key-recovery attack against MANTIS5 with 228 chosen plaintexts and a computational complexity of about 238 block cipher calls, which violates this claim. Our attack is based on a family of differential characteristics and exploits several properties of the lightweight round function and tweakey schedule. To verify the validity of the attack, we also provide a practical implementation which recovers the full key in about 1 core hour using 230 chosen plaintexts.


2014 ◽  
Vol 2014 ◽  
pp. 1-7
Author(s):  
Lin Ding ◽  
Chenhui Jin ◽  
Jie Guan ◽  
Qiuyan Wang

Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231and a data complexity of 268, which reduces the time complexity of the Guess and Determine attack proposed by the designers by a factor of 216. Furthermore, a related key chosenIVattack on a scaled-down version of Loiss is presented. The attack recovers the 128-bit secret key of the scaled-down Loiss with a time complexity of 280, requiring 264chosenIVs. The related key attack is minimal in the sense that it only requires one related key. The result shows that our key recovery attack on the scaled-down Loiss is much better than an exhaustive key search in the related key setting.


Author(s):  
Sadegh Sadeghi ◽  
Tahereh Mohammadi ◽  
Nasour Bagheri

SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different versions of SKINNY .We utilize Mixed Integer Linear Programming (MILP) to search all zero-correlation linear distinguishers for all variants of SKINNY, where the longest distinguisher found reaches 10 rounds. Using a 9-round characteristic, we present 14 and 18-round zero correlation attacks on SKINNY-64-64 and SKINNY- 64-128, respectively. Also, for SKINNY-n-n and SKINNY-n-2n, we construct 13 and 15-round related-tweakey impossible differential characteristics, respectively. Utilizing these characteristics, we propose 23-round related-tweakey impossible differential cryptanalysis by applying the key recovery attack for SKINNY-n-2n and 19-round attack for SKINNY-n-n. To the best of our knowledge, the presented zero-correlation characteristics in this paper are the first attempt to investigate the security of SKINNY against this attack and the results on the related-tweakey impossible differential attack are the best reported ones.


Author(s):  
Lorenzo Grassi ◽  
Christian Rechberger ◽  
Sondre Rønjom

We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. Interestingly, subspace trail cryptanalysis in fact includes techniques based on impossible or truncated differentials and integrals as special cases. Choosing AES-128 as the perhaps most studied cipher, we describe distinguishers up to 5-round AES with a single unknown key. We report (and practically verify) competitive key-recovery attacks with very low data-complexity on 2, 3 and 4 rounds of AES. Additionally, we consider AES with a secret S-Box and we present a (generic) technique that allows to directly recover the secret key without finding any information about the secret S-Box. This approach allows to use e.g. truncated differential, impossible differential and integral attacks to find the secret key. Moreover, this technique works also for other AES-like constructions, if some very common conditions on the S-Box and on the MixColumns matrix (or its inverse) hold. As a consequence, such attacks allow to better highlight the security impact of linear mappings inside an AES-like block cipher. Finally, we show that our impossible differential attack on 5 rounds of AES with secret S-Box can be turned into a distinguisher for AES in the same setting as the one recently proposed by Sun, Liu, Guo, Qu and Rijmen at CRYPTO 2016


2019 ◽  
pp. 243-255
Author(s):  
Zdzisław Aleksander

When looking at the relationship between substantive education and the pedagogical background of a teacher (foreign language teacher included) there has been an eternal disagreement both in the academia, as well as among prospective employers. The most essential controversy pertains to the degree of expertise a teacher should possess in the field they teach versus how much psycho-pedagogical and educational knowledge they should have and the mutual relationship of the two. Another area of dispute and debate within the teachers’ education specialism seems to occur between two parties: proponents of theoretical research and the narrow circle of practical education advocates. The empirical annex, which points to the level of vocational preparation of a language teacher, focuses on the choice of didactic activities, the quality of their execution, and the working conditions which are under a teacher’s control.


Blood ◽  
1986 ◽  
Vol 67 (3) ◽  
pp. 616-622 ◽  
Author(s):  
C Kluft ◽  
P Los ◽  
AF Jie ◽  
VW van Hinsbergh ◽  
E Vellenga ◽  
...  

Alpha-2-antiplasmin, a major inhibitor of fibrinolysis, is synthesized in the liver and occurs in blood in two molecular forms: a very active plasminogen-binding (PB) form and a less active nonplasminogen-binding (NPB) form. This study investigates the origin and mutual relationship of these two forms in vivo and in vitro. Despite wide variation in plasma concentration of the inhibitor (16% to 138%), the ratio between the two forms in vivo was found to be, in the main, constant among healthy volunteers, heterozygotes for a congenital deficiency of alpha- 2-antiplasmin, and patients with a stable liver cirrhosis: PB/NPB = 2.41 +/- 0.34 (SD). Resynthesis after depletion or increased synthesis in the acute-phase reaction showed a specific increase of the PB form of the molecule in blood after discontinuation of L-asparaginase or streptokinase therapy and after myocardial infarction. In vitro studies demonstrated that only the PB form was present after one day in the culture medium of the human cell line Hep G2, while the NPB form appeared after 11 days. Clearance after inhibition of synthesis by L- asparaginase therapy revealed a more rapid decrease in the PB form relative to the NPB form in blood, demonstrated by a change in the PB- NPB ratio from 2.86 +/- 0.55 to 1.74 +/- 0.24 (mean of 6, SD). An apparently spontaneous first order conversion from the PB to NPB form, with an apparent half-life of about eight days, was demonstrated at 37 degrees C in plasma and serum in vitro. The conversion was found to be temperature dependent and uninfluenced by the fibrinolytic components fibrinogen, fibrin, and plasminogen. Additions of a variety of enzymes or inhibitors did not interfere with the process. These results demonstrate that the PB form of alpha-2-antiplasmin is produced by the liver and that the NPB form is formed in the circulation.


2012 ◽  
Vol 57 (192) ◽  
pp. 55-78 ◽  
Author(s):  
Zdeňka Malá ◽  
Gabriela Cervená

The paper focuses on an analysis of income inequality and expenditure inequality of households in the Czech Republic for the period 2001 - 2009, based on data from the Statistics of Family Accounts. The basic methodological tool is the Gini coefficient and its decomposition according to individual categories of consumer expenditure. The conducted research reaches the conclusion that income inequality is higher than inequality in consumer expenditure, and income inequality for the analyzed period is growing at a higher rate than expenditure inequality. Tax-transfer tools effectively eliminate income inequality, but nevertheless inequality of disposable income exceeds the inequality of net monetary expenditure. As regards the mutual relationship of income inequality and expenditure inequality, expenditure inequality within a period of economic growth and boom copied the course of income inequality, while within a period of economic decline and recession both inequalities showed a completely different development. The main determinant affecting income inequality may be considered to be non-consumer expenditure, particularly expenditure for the acquisition of real estate.


Sign in / Sign up

Export Citation Format

Share Document