algebraic attack
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 3)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Min Hsuan Cheng

In recent years, Algebraic Attack has emerged to be an important cryptanalysis method in evaluating encryption algorithms. The attack exploits algebraic equations between the inputs and outputs of a cipher to solve for the targeted information. The complexity of the attack depends on the algebraic degree of the equations, the number of equations, and the probabilistic conditions employed. Addition Modulo 2n had been suggested over logic XOR as a mixing element to better defend against Algebraic Attack. However, it has been discovered that the complexity of the traditional Modulo Addition can be greatly reduced with the right equations and probabilistic conditions. The presented work introduces a new Modulo Addition structure that includes an Input Expansion, Modulo Addition, and Output Compaction. The security of the new structure is scalable and user-defined as the new structure increases the algebraic degree and thwarts the probabilistic conditions.



2021 ◽  
Author(s):  
Min Hsuan Cheng

In recent years, Algebraic Attack has emerged to be an important cryptanalysis method in evaluating encryption algorithms. The attack exploits algebraic equations between the inputs and outputs of a cipher to solve for the targeted information. The complexity of the attack depends on the algebraic degree of the equations, the number of equations, and the probabilistic conditions employed. Addition Modulo 2n had been suggested over logic XOR as a mixing element to better defend against Algebraic Attack. However, it has been discovered that the complexity of the traditional Modulo Addition can be greatly reduced with the right equations and probabilistic conditions. The presented work introduces a new Modulo Addition structure that includes an Input Expansion, Modulo Addition, and Output Compaction. The security of the new structure is scalable and user-defined as the new structure increases the algebraic degree and thwarts the probabilistic conditions.



Cryptanalysis is a very important challenge that faces cryptographers. It has several types that should be well studied by cryptographers to be able to design cryptosystem more secure and able to resist any type of attacks. This paper introduces six types of attacks: Linear, Differential , Linear-Differential, Truncated differential Impossible differential attack and Algebraic attacks. In this paper, algebraic attack is used to formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system by using a classical method called Grobner  Bases . By Solving these equations, we made algebraic attack on S-box.



2020 ◽  
Vol 9 (1) ◽  
pp. 2214-2218

The Advanced Encryption Standard (AES) algorithm is available in a wide scope of encryption packages and is the single straightforwardly accessible cipher insisted by the National Security Agency (NSA), The Rijndael S-box is a substitution box S-Box assumes a significant job in the AES algorithm security. The quality of S-Box relies upon the plan and mathematical developments. Our paper gives an outline of AES S-Box investigation, the paper finds that algebraic attack is the most security gap of AES S-Box, likewise give a thought regarding distinctive past research to improve the static Sconfines that has been utilized AES, to upgrade the quality of AES Performance by shocking the best S-box.



2020 ◽  
pp. 905-912
Author(s):  
Wageda I. El Sobky ◽  
◽  
Ahmed R. Mahmoud ◽  
Ashraf S. Mohra ◽  
T. El-Garf

Human relationships rely on trust, which is the reason that the authentication and related digital signatures are the most complex and confusing areas of cryptography. The Massage Authentication Codes (MACs) could be built from cryptographic hash functions or block cipher modes of operations. Substitution-Box (S-Box) is the unique nonlinear operation in block ciphers, and it determines the cipher performance. The stronger S-Box, the stronger and more secure the algorithm. This paper focuses on the security considerations for MACs using block cipher modes of operations with the Hierocrypt-3 block cipher. the Hierocrypt-3 could be considered as a week cipher. It could be enhanced by changing its S-Box with a new one that has better performance against algebraic attack with using different modes of operations. The mathematical model for the new S-Boxes with its properties is provided. The result of this change appeared in the mirror of Average Strict Avalanche Criterion (SAC) and some other properties. SAC could be improved from 0.80469 to 0.16406. The Hierocrypt-3 could be enhanced for more security.



Author(s):  
Maria Eichlseder ◽  
Lorenzo Grassi ◽  
Reinhard Lüftenegger ◽  
Morten Øygarden ◽  
Christian Rechberger ◽  
...  
Keyword(s):  


Author(s):  
Magali Bardet ◽  
Pierre Briaud ◽  
Maxime Bros ◽  
Philippe Gaborit ◽  
Vincent Neiger ◽  
...  


2019 ◽  
Vol 13 (5) ◽  
pp. 448-458
Author(s):  
Hossein Arabnezhad-Khanoki ◽  
Babak Sadeghiyan ◽  
Josef Pieprzyk
Keyword(s):  


2019 ◽  
Author(s):  
Yong-Zhang Luo ◽  
Cheng Zhang ◽  
Chenglian Liu ◽  
Chieh-Wen Hsu


Sign in / Sign up

Export Citation Format

Share Document