Paper 2017/610

Differential Attacks: Using Alternative Operations

Céline Blondeau, Roberto Civino, and Massimiliano Sala

Abstract

Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed how to effectively compute alternative operations on a vector space which can serve as message space for a block cipher such that the resulting structure is still a vector space. The latter were used to mount a linearisation attack against a toy cipher. Here we investigate the possibility to design a block cipher which appears to be secure w.r.t. classical differential cryptanalysis, but weaker with respect to our attack which make use of alternative operations. Furthermore we compare the success probabilities of a distinguishing attack.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
block ciphersdifferential cryptanalysisdistinguisheralternative operations
Contact author(s)
robcivino @ gmail com
History
2017-06-26: received
Short URL
https://ia.cr/2017/610
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/610,
      author = {Céline Blondeau and Roberto Civino and Massimiliano Sala},
      title = {Differential Attacks: Using Alternative Operations},
      howpublished = {Cryptology ePrint Archive, Paper 2017/610},
      year = {2017},
      note = {\url{https://eprint.iacr.org/2017/610}},
      url = {https://eprint.iacr.org/2017/610}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.