Efficient Slide Attacks

The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n i...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of cryptology 2018-07, Vol.31 (3), p.641-670
Hauptverfasser: Bar-On, Achiya, Biham, Eli, Dunkelman, Orr, Keller, Nathan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 670
container_issue 3
container_start_page 641
container_title Journal of cryptology
container_volume 31
creator Bar-On, Achiya
Biham, Eli
Dunkelman, Orr
Keller, Nathan
description The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n is the block size). There are only a few known scenarios in which the slide attack performs better than the 2 n bound. In this paper, we concentrate on efficient slide attacks, whose time complexity is less than 2 n . We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least 2 n operations. In particular, we present the first known slide attack on a Feistel construction with a 3-round self-similarity, and an attack with practical time complexity of 2 40 on a 128-bit key variant of the GOST block cipher with unknown S-boxes. The best previously known attack on the same variant, with known S-boxes (by Courtois), has time complexity of 2 91 .
doi_str_mv 10.1007/s00145-017-9266-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2047357590</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2047357590</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</originalsourceid><addsrcrecordid>eNp1j71PwzAQRy0EEqEwI7ZKzIY7O7bjsapKQarEAMyW4w-UUpJipwP_Pa6CxMR0y3u_0yPkBuEOAdR9BsBaUEBFNZOSNiekwpozilw1p6QCzTllSsM5uch5W2glFK_I9SrGznWhH-cvu86H-WIcrfvIl-Qs2l0OV793Rt4eVq_LR7p5Xj8tFxvqOMqRWsul80K2VgUNjgkeGG8F88KDtSAjSi5VjEID2lYKX-voMbSxQedCrfmM3E67-zR8HUIezXY4pL68NAxqxYUqaqFwolwack4hmn3qPm36Ngjm2G-mflOyzLHfNMVhk5ML27-H9Lf8v_QDcURbbQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2047357590</pqid></control><display><type>article</type><title>Efficient Slide Attacks</title><source>SpringerLink Journals - AutoHoldings</source><creator>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</creator><creatorcontrib>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</creatorcontrib><description>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n is the block size). There are only a few known scenarios in which the slide attack performs better than the 2 n bound. In this paper, we concentrate on efficient slide attacks, whose time complexity is less than 2 n . We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least 2 n operations. In particular, we present the first known slide attack on a Feistel construction with a 3-round self-similarity, and an attack with practical time complexity of 2 40 on a 128-bit key variant of the GOST block cipher with unknown S-boxes. The best previously known attack on the same variant, with known S-boxes (by Courtois), has time complexity of 2 91 .</description><identifier>ISSN: 0933-2790</identifier><identifier>EISSN: 1432-1378</identifier><identifier>DOI: 10.1007/s00145-017-9266-8</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Boxes ; Coding and Information Theory ; Combinatorics ; Communications Engineering ; Complexity ; Computational Mathematics and Numerical Analysis ; Computer Science ; Computer systems ; Cryptography ; Encryption ; Networks ; Probability Theory and Stochastic Processes ; Self-similarity ; Sequential scheduling</subject><ispartof>Journal of cryptology, 2018-07, Vol.31 (3), p.641-670</ispartof><rights>International Association for Cryptologic Research 2017</rights><rights>International Association for Cryptologic Research 2017.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</citedby><cites>FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00145-017-9266-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00145-017-9266-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Bar-On, Achiya</creatorcontrib><creatorcontrib>Biham, Eli</creatorcontrib><creatorcontrib>Dunkelman, Orr</creatorcontrib><creatorcontrib>Keller, Nathan</creatorcontrib><title>Efficient Slide Attacks</title><title>Journal of cryptology</title><addtitle>J Cryptol</addtitle><description>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n is the block size). There are only a few known scenarios in which the slide attack performs better than the 2 n bound. In this paper, we concentrate on efficient slide attacks, whose time complexity is less than 2 n . We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least 2 n operations. In particular, we present the first known slide attack on a Feistel construction with a 3-round self-similarity, and an attack with practical time complexity of 2 40 on a 128-bit key variant of the GOST block cipher with unknown S-boxes. The best previously known attack on the same variant, with known S-boxes (by Courtois), has time complexity of 2 91 .</description><subject>Algorithms</subject><subject>Boxes</subject><subject>Coding and Information Theory</subject><subject>Combinatorics</subject><subject>Communications Engineering</subject><subject>Complexity</subject><subject>Computational Mathematics and Numerical Analysis</subject><subject>Computer Science</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Networks</subject><subject>Probability Theory and Stochastic Processes</subject><subject>Self-similarity</subject><subject>Sequential scheduling</subject><issn>0933-2790</issn><issn>1432-1378</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp1j71PwzAQRy0EEqEwI7ZKzIY7O7bjsapKQarEAMyW4w-UUpJipwP_Pa6CxMR0y3u_0yPkBuEOAdR9BsBaUEBFNZOSNiekwpozilw1p6QCzTllSsM5uch5W2glFK_I9SrGznWhH-cvu86H-WIcrfvIl-Qs2l0OV793Rt4eVq_LR7p5Xj8tFxvqOMqRWsul80K2VgUNjgkeGG8F88KDtSAjSi5VjEID2lYKX-voMbSxQedCrfmM3E67-zR8HUIezXY4pL68NAxqxYUqaqFwolwack4hmn3qPm36Ngjm2G-mflOyzLHfNMVhk5ML27-H9Lf8v_QDcURbbQ</recordid><startdate>20180701</startdate><enddate>20180701</enddate><creator>Bar-On, Achiya</creator><creator>Biham, Eli</creator><creator>Dunkelman, Orr</creator><creator>Keller, Nathan</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20180701</creationdate><title>Efficient Slide Attacks</title><author>Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr ; Keller, Nathan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-aa36cd56ba7e90c253e23b52d5d0aa06f16367ff5901ab65d49fd1ebf81cce493</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Boxes</topic><topic>Coding and Information Theory</topic><topic>Combinatorics</topic><topic>Communications Engineering</topic><topic>Complexity</topic><topic>Computational Mathematics and Numerical Analysis</topic><topic>Computer Science</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Networks</topic><topic>Probability Theory and Stochastic Processes</topic><topic>Self-similarity</topic><topic>Sequential scheduling</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bar-On, Achiya</creatorcontrib><creatorcontrib>Biham, Eli</creatorcontrib><creatorcontrib>Dunkelman, Orr</creatorcontrib><creatorcontrib>Keller, Nathan</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bar-On, Achiya</au><au>Biham, Eli</au><au>Dunkelman, Orr</au><au>Keller, Nathan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Slide Attacks</atitle><jtitle>Journal of cryptology</jtitle><stitle>J Cryptol</stitle><date>2018-07-01</date><risdate>2018</risdate><volume>31</volume><issue>3</issue><spage>641</spage><epage>670</epage><pages>641-670</pages><issn>0933-2790</issn><eissn>1432-1378</eissn><abstract>The slide attack, presented by Biryukov and Wagner, has already become a classical tool in cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its practical applicability is limited, as typically, its time complexity is lower bounded by 2 n (where n is the block size). There are only a few known scenarios in which the slide attack performs better than the 2 n bound. In this paper, we concentrate on efficient slide attacks, whose time complexity is less than 2 n . We present a number of new attacks that apply in scenarios in which previously known slide attacks are either inapplicable, or require at least 2 n operations. In particular, we present the first known slide attack on a Feistel construction with a 3-round self-similarity, and an attack with practical time complexity of 2 40 on a 128-bit key variant of the GOST block cipher with unknown S-boxes. The best previously known attack on the same variant, with known S-boxes (by Courtois), has time complexity of 2 91 .</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s00145-017-9266-8</doi><tpages>30</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0933-2790
ispartof Journal of cryptology, 2018-07, Vol.31 (3), p.641-670
issn 0933-2790
1432-1378
language eng
recordid cdi_proquest_journals_2047357590
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Boxes
Coding and Information Theory
Combinatorics
Communications Engineering
Complexity
Computational Mathematics and Numerical Analysis
Computer Science
Computer systems
Cryptography
Encryption
Networks
Probability Theory and Stochastic Processes
Self-similarity
Sequential scheduling
title Efficient Slide Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T16%3A26%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Slide%20Attacks&rft.jtitle=Journal%20of%20cryptology&rft.au=Bar-On,%20Achiya&rft.date=2018-07-01&rft.volume=31&rft.issue=3&rft.spage=641&rft.epage=670&rft.pages=641-670&rft.issn=0933-2790&rft.eissn=1432-1378&rft_id=info:doi/10.1007/s00145-017-9266-8&rft_dat=%3Cproquest_cross%3E2047357590%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2047357590&rft_id=info:pmid/&rfr_iscdi=true