Efficient Slide Attacks
The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n i...
Gespeichert in:
Veröffentlicht in: | Journal of cryptology 2018-07, Vol.31 (3), p.641-670 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 670 |
---|---|
container_issue | 3 |
container_start_page | 641 |
container_title | Journal of cryptology |
container_volume | 31 |
creator | Bar-On, Achiya Biham, Eli Dunkelman, Orr Keller, Nathan |
description | The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by
2
n
(where
n
is the block size). There are only a few known scenarios in which the slide attack performs better than the
2
n
bound. In this paper, we concentrate on
efficient
slide attacks, whose time complexity is less than
2
n
. We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least
2
n
operations. In particular, we present the first known slide attack on a Feistel construction with a
3-round
self-similarity, and an attack with practical time complexity of
2
40
on a 128-bit key variant of the GOST block cipher with
unknown
S-boxes. The best previously known attack on the same variant, with
known
S-boxes (by Courtois), has time complexity of
2
91
. |
doi_str_mv | 10.1007/s00145-017-9266-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2047357590</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2047357590</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</originalsourceid><addsrcrecordid>eNp1j71PwzAQRy0EEqEwI7ZKzIY7O7bjsapKQarEAMyW4w-UUpJipwP_Pa6CxMR0y3u_0yPkBuEOAdR9BsBaUEBFNZOSNiekwpozilw1p6QCzTllSsM5uch5W2glFK_I9SrGznWhH-cvu86H-WIcrfvIl-Qs2l0OV793Rt4eVq_LR7p5Xj8tFxvqOMqRWsul80K2VgUNjgkeGG8F88KDtSAjSi5VjEID2lYKX-voMbSxQedCrfmM3E67-zR8HUIezXY4pL68NAxqxYUqaqFwolwack4hmn3qPm36Ngjm2G-mflOyzLHfNMVhk5ML27-H9Lf8v_QDcURbbQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2047357590</pqid></control><display><type>article</type><title>Efficient Slide Attacks</title><source>SpringerLink Journals - AutoHoldings</source><creator>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</creator><creatorcontrib>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</creatorcontrib><description>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by
2
n
(where
n
is the block size). There are only a few known scenarios in which the slide attack performs better than the
2
n
bound. In this paper, we concentrate on
efficient
slide attacks, whose time complexity is less than
2
n
. We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least
2
n
operations. In particular, we present the first known slide attack on a Feistel construction with a
3-round
self-similarity, and an attack with practical time complexity of
2
40
on a 128-bit key variant of the GOST block cipher with
unknown
S-boxes. The best previously known attack on the same variant, with
known
S-boxes (by Courtois), has time complexity of
2
91
.</description><identifier>ISSN: 0933-2790</identifier><identifier>EISSN: 1432-1378</identifier><identifier>DOI: 10.1007/s00145-017-9266-8</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Boxes ; Coding and Information Theory ; Combinatorics ; Communications Engineering ; Complexity ; Computational Mathematics and Numerical Analysis ; Computer Science ; Computer systems ; Cryptography ; Encryption ; Networks ; Probability Theory and Stochastic Processes ; Self-similarity ; Sequential scheduling</subject><ispartof>Journal of cryptology, 2018-07, Vol.31 (3), p.641-670</ispartof><rights>International Association for Cryptologic Research 2017</rights><rights>International Association for Cryptologic Research 2017.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</citedby><cites>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00145-017-9266-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00145-017-9266-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Bar-On, Achiya</creatorcontrib><creatorcontrib>Biham, Eli</creatorcontrib><creatorcontrib>Dunkelman, Orr</creatorcontrib><creatorcontrib>Keller, Nathan</creatorcontrib><title>Efficient Slide Attacks</title><title>Journal of cryptology</title><addtitle>J Cryptol</addtitle><description>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by
2
n
(where
n
is the block size). There are only a few known scenarios in which the slide attack performs better than the
2
n
bound. In this paper, we concentrate on
efficient
slide attacks, whose time complexity is less than
2
n
. We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least
2
n
operations. In particular, we present the first known slide attack on a Feistel construction with a
3-round
self-similarity, and an attack with practical time complexity of
2
40
on a 128-bit key variant of the GOST block cipher with
unknown
S-boxes. The best previously known attack on the same variant, with
known
S-boxes (by Courtois), has time complexity of
2
91
.</description><subject>Algorithms</subject><subject>Boxes</subject><subject>Coding and Information Theory</subject><subject>Combinatorics</subject><subject>Communications Engineering</subject><subject>Complexity</subject><subject>Computational Mathematics and Numerical Analysis</subject><subject>Computer Science</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Networks</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Self-similarity</subject><subject>Sequential scheduling</subject><issn>0933-2790</issn><issn>1432-1378</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1j71PwzAQRy0EEqEwI7ZKzIY7O7bjsapKQarEAMyW4w-UUpJipwP_Pa6CxMR0y3u_0yPkBuEOAdR9BsBaUEBFNZOSNiekwpozilw1p6QCzTllSsM5uch5W2glFK_I9SrGznWhH-cvu86H-WIcrfvIl-Qs2l0OV793Rt4eVq_LR7p5Xj8tFxvqOMqRWsul80K2VgUNjgkeGG8F88KDtSAjSi5VjEID2lYKX-voMbSxQedCrfmM3E67-zR8HUIezXY4pL68NAxqxYUqaqFwolwack4hmn3qPm36Ngjm2G-mflOyzLHfNMVhk5ML27-H9Lf8v_QDcURbbQ</recordid><startdate>20180701</startdate><enddate>20180701</enddate><creator>Bar-On, Achiya</creator><creator>Biham, Eli</creator><creator>Dunkelman, Orr</creator><creator>Keller, Nathan</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20180701</creationdate><title>Efficient Slide Attacks</title><author>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Boxes</topic><topic>Coding and Information Theory</topic><topic>Combinatorics</topic><topic>Communications Engineering</topic><topic>Complexity</topic><topic>Computational Mathematics and Numerical Analysis</topic><topic>Computer Science</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Networks</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Self-similarity</topic><topic>Sequential scheduling</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bar-On, Achiya</creatorcontrib><creatorcontrib>Biham, Eli</creatorcontrib><creatorcontrib>Dunkelman, Orr</creatorcontrib><creatorcontrib>Keller, Nathan</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bar-On, Achiya</au><au>Biham, Eli</au><au>Dunkelman, Orr</au><au>Keller, Nathan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Slide Attacks</atitle><jtitle>Journal of cryptology</jtitle><stitle>J Cryptol</stitle><date>2018-07-01</date><risdate>2018</risdate><volume>31</volume><issue>3</issue><spage>641</spage><epage>670</epage><pages>641-670</pages><issn>0933-2790</issn><eissn>1432-1378</eissn><abstract>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by
2
n
(where
n
is the block size). There are only a few known scenarios in which the slide attack performs better than the
2
n
bound. In this paper, we concentrate on
efficient
slide attacks, whose time complexity is less than
2
n
. We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least
2
n
operations. In particular, we present the first known slide attack on a Feistel construction with a
3-round
self-similarity, and an attack with practical time complexity of
2
40
on a 128-bit key variant of the GOST block cipher with
unknown
S-boxes. The best previously known attack on the same variant, with
known
S-boxes (by Courtois), has time complexity of
2
91
.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s00145-017-9266-8</doi><tpages>30</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0933-2790 |
ispartof | Journal of cryptology, 2018-07, Vol.31 (3), p.641-670 |
issn | 0933-2790 1432-1378 |
language | eng |
recordid | cdi_proquest_journals_2047357590 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Boxes Coding and Information Theory Combinatorics Communications Engineering Complexity Computational Mathematics and Numerical Analysis Computer Science Computer systems Cryptography Encryption Networks Probability Theory and Stochastic Processes Self-similarity Sequential scheduling |
title | Efficient Slide Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T16%3A26%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Slide%20Attacks&rft.jtitle=Journal%20of%20cryptology&rft.au=Bar-On,%20Achiya&rft.date=2018-07-01&rft.volume=31&rft.issue=3&rft.spage=641&rft.epage=670&rft.pages=641-670&rft.issn=0933-2790&rft.eissn=1432-1378&rft_id=info:doi/10.1007/s00145-017-9266-8&rft_dat=%3Cproquest_cross%3E2047357590%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2047357590&rft_id=info:pmid/&rfr_iscdi=true |