permutation networks
Recently Published Documents


TOTAL DOCUMENTS

73
(FIVE YEARS 8)

H-INDEX

12
(FIVE YEARS 1)

Author(s):  
Zhenzhen Bao ◽  
Jian Guo ◽  
Eik List

Distinguishers on round-reduced AES have attracted considerable attention in the recent years. While the number of rounds covered in key-recovery attacks did not increase, subspace, yoyo, mixture-differential, and multiple-of-n cryptanalysis advanced the understanding of the properties of the cipher.For substitution-permutation networks, integral attacks are a suitable target for extension since they usually end after a linear layer sums several subcomponents. Based on results by Patarin, Chen et al. already observed that the expected number of collisions for a sum of permutations differs slightly from that for a random primitive. Though, their target remained lightweight primitives.The present work illustrates how the well-known integral distinguisher on three-round AES resembles a sum of PRPs and can be extended to truncated-differential distinguishers over 4 and 5 rounds. In contrast to previous distinguishers by Grassi et al., our approach allows to prepend a round that starts from a diagonal subspace. We demonstrate how the prepended round can be used for key recovery with a new differential key-recovery attack on six-round AES. Moreover, we show how the prepended round can also be integrated to form a six-round distinguisher. For all distinguishers and the key-recovery attack, our results are supported by implementations with Cid et al.’s established Small-AES version. While the distinguishers do not threaten the security of the AES, they try to shed more light on its properties.


Author(s):  
Yuan Gao ◽  
Chun Guo ◽  
Meiqin Wang ◽  
Weijia Wang ◽  
Jiejing Wen

Recent works of Cogliati et al. (CRYPTO 2018) have initiated provable treatments of Substitution-Permutation Networks (SPNs), one of the most popular approach to construct modern blockciphers. Such theoretical SPN models may employ non-linear diffusion layers, which enables beyond-birthday-bound provable security. Though, for the model of real world blockciphers, i.e., SPN models with linear diffusion layers, existing provable results are capped at birthday security up to 2n/2 adversarial queries, where n is the size of the idealized S-boxes.In this paper, we overcome this birthday barrier and prove that a 4-round SPN with linear diffusion layers and independent round keys is secure up to 22n/3 queries. For this, we identify conditions on the linear layers that are sufficient for such security, which, unsurprisingly, turns out to be slightly stronger than Cogliati et al.’s conditions for birthday security. These provides additional theoretic supports for real world SPN blockciphers.


Author(s):  
Hamid Boukerrou ◽  
Paul Huynh ◽  
Virginie Lallemand ◽  
Bimal Mandal ◽  
Marine Minier

At Eurocrypt 2018, Cid et al. introduced the Boomerang Connectivity Table (BCT), a tool to compute the probability of the middle round of a boomerang distinguisher from the description of the cipher’s Sbox(es). Their new table and the following works led to a refined understanding of boomerangs, and resulted in a series of improved attacks. Still, these works only addressed the case of Substitution Permutation Networks, and completely left out the case of ciphers following a Feistel construction. In this article, we address this lack by introducing the FBCT, the Feistel counterpart of the BCT. We show that the coefficient at row Δi, ∇o corresponds to the number of times the second order derivative at points Δi, ∇o) cancels out. We explore the properties of the FBCT and compare it to what is known on the BCT. Taking matters further, we show how to compute the probability of a boomerang switch over multiple rounds with a generic formula.


Author(s):  
Lorenzo Grassi ◽  
Reinhard Lüftenegger ◽  
Christian Rechberger ◽  
Dragos Rotaru ◽  
Markus Schofnegger

2018 ◽  
Vol 65 (2) ◽  
pp. 231-235 ◽  
Author(s):  
Vikash Sehwag ◽  
N. Prasad ◽  
Indrajit Chakrabarti

Author(s):  
Benoît Cogliati ◽  
Yevgeniy Dodis ◽  
Jonathan Katz ◽  
Jooyoung Lee ◽  
John Steinberger ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document