Thesis Open Access

Differential Cryptanalysis of Symmetric Primitives

Eichlseder, Maria


JSON Export

{
  "conceptdoi": "10.5281/zenodo.1288324", 
  "conceptrecid": "1288324", 
  "created": "2018-06-13T08:29:03.256621+00:00", 
  "doi": "10.5281/zenodo.1288325", 
  "files": [
    {
      "bucket": "e38ce25b-4a41-4b2d-8aea-8f583c95e3ff", 
      "checksum": "md5:016c7df680510b96e1f1ec0622b2f9aa", 
      "key": "thesis_print_book.pdf", 
      "links": {
        "self": "https://zenodo.org/api/files/e38ce25b-4a41-4b2d-8aea-8f583c95e3ff/thesis_print_book.pdf"
      }, 
      "size": 2162479, 
      "type": "pdf"
    }
  ], 
  "id": 1288325, 
  "links": {
    "badge": "https://zenodo.org/badge/doi/10.5281/zenodo.1288325.svg", 
    "bucket": "https://zenodo.org/api/files/e38ce25b-4a41-4b2d-8aea-8f583c95e3ff", 
    "conceptbadge": "https://zenodo.org/badge/doi/10.5281/zenodo.1288324.svg", 
    "conceptdoi": "https://doi.org/10.5281/zenodo.1288324", 
    "doi": "https://doi.org/10.5281/zenodo.1288325", 
    "html": "https://zenodo.org/record/1288325", 
    "latest": "https://zenodo.org/api/records/1288325", 
    "latest_html": "https://zenodo.org/record/1288325"
  }, 
  "metadata": {
    "access_right": "open", 
    "access_right_category": "success", 
    "communities": [
      {
        "id": "hector"
      }
    ], 
    "creators": [
      {
        "affiliation": "Institute of Applied Information Processing and Communications Graz University of Technology", 
        "name": "Eichlseder, Maria"
      }
    ], 
    "description": "<p>We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the security of symmetric cryptographic algorithms is the resistance of their core building block, the primitive, against cryptanalytic attacks such as differential, linear, and algebraic cryptanalysis. The fundamental idea of differential cryptanalysis is to extract secret information or forge malicious messages by investigating the behavior of the primitive for two related, slightly different inputs, and has proven both very powerful and highly versatile since its inception in the 1990s. Resistance against such attacks is thus one of the cornerstones in the design of block ciphers. More recently, alternative symmetric primitives have risen to general attention: Permutations and tweakable block ciphers in particular have shown the potential to rival block ciphers in their role as the ideal primitive for efficient and elegant schemes. However, the available cryptanalytic tools and theory on the design and analysis of these alternative primitives are arguably less mature than for block ciphers. We investigate the security of these primitives against differential cryptanalysis. Compared to classic block ciphers, adversaries who target permutations or tweakable block ciphers can take advantage of known, chosen, or related round-key material. We find that in some cases, the designers&#39; block-cipher-based design strategies do not sufficiently protect against variations of the classical differential strategy. In particular, we break the full security claims of the tweakable block cipher MANTIS-5 and the permutation Simpira v1. We provide a key recovery attack for the round-reduced block cipher LowMC and analyze the authenticated cipher Prost in a related-key setting. We also develop techniques to improve the computer-aided differential analysis of unkeyed primitives, leading to the best practical collision attacks on the round-reduced hash standard SHA-2.</p>", 
    "doi": "10.5281/zenodo.1288325", 
    "grants": [
      {
        "acronym": "HECTOR", 
        "code": "644052", 
        "funder": {
          "acronyms": [
            "EC"
          ], 
          "doi": "10.13039/501100000780", 
          "links": {
            "self": "https://zenodo.org/api/funders/10.13039/501100000780"
          }, 
          "name": "European Commission"
        }, 
        "links": {
          "self": "https://zenodo.org/api/grants/10.13039/501100000780::644052"
        }, 
        "program": "H2020", 
        "title": "HARDWARE ENABLED CRYPTO AND RANDOMNESS"
      }
    ], 
    "license": {
      "id": "CC-BY-NC-ND-4.0"
    }, 
    "notes": "This work was partially funded by the European Union's Horizon 2020 research and innovation programme under grant agreement number 644052 (HECTOR).", 
    "publication_date": "2018-03-01", 
    "related_identifiers": [
      {
        "identifier": "10.5281/zenodo.1288324", 
        "relation": "isVersionOf", 
        "scheme": "doi"
      }
    ], 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "1288325"
          }, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "1288324"
          }
        }
      ]
    }, 
    "resource_type": {
      "subtype": "thesis", 
      "title": "Thesis", 
      "type": "publication"
    }, 
    "thesis": {
      "supervisors": [
        {
          "affiliation": "Graz University of Technology", 
          "name": "Mendel, Florian"
        }, 
        {
          "affiliation": "Graz University of Technology", 
          "name": "Rechberger, Christian"
        }, 
        {
          "affiliation": "Radboud University Nijmegen", 
          "name": "Daemen, Joan"
        }
      ], 
      "university": "Graz University of Technology"
    }, 
    "title": "Differential Cryptanalysis of Symmetric Primitives"
  }, 
  "owners": [
    22112
  ], 
  "revision": 5, 
  "stats": {
    "downloads": 60.0, 
    "unique_downloads": 56.0, 
    "unique_views": 8.0, 
    "version_downloads": 60.0, 
    "version_unique_downloads": 56.0, 
    "version_unique_views": 8.0, 
    "version_views": 8.0, 
    "version_volume": 129748740.0, 
    "views": 8.0, 
    "volume": 129748740.0
  }, 
  "updated": "2018-06-13T08:53:19.338294+00:00"
}
8
60
views
downloads
All versions This version
Views 88
Downloads 6060
Data volume 129.7 MB129.7 MB
Unique views 88
Unique downloads 5656

Share

Cite as