Skip to main content

Questions tagged [differential-analysis]

Differential cryptanalysis is a form of cryptanalysis which studies cryptographic algorithms by observing how differences in input affect differences in output.

2 votes
1 answer
84 views

In the paper for breaking 16-round DES with differential cryptanalysis, on pages 79-81 in the document I linked, the authors describe a technique on adding an initial round to the 15 round attack. ...
poeplva19's user avatar
2 votes
1 answer
183 views

In my introduction to cryptography course I only ever did differential cryptanalysis on ciphers which were completly linear. Now I am analyzing a hash function, where I have to propagate XOR ...
David Krell's user avatar
2 votes
1 answer
70 views

I'm currently reading an interesting paper, "Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective", and I had a couple of questions in Section 4.1, which ...
AJAY KUMAR DAS's user avatar
4 votes
0 answers
155 views

For any positive integer $k$, let $\boxplus_k$ be addition on $k$-bit unsigned integers and $\boxminus_k$ be subtraction on $k$-bit unsigned integers. Let $\operatorname{NH}_w((X,Y),(a,b)) = (a \...
jbapple's user avatar
  • 149
2 votes
1 answer
136 views

I'd like to teach linear and differential cryptanalysis using AES as an example. I'm guessing there must be a number of rounds that are realistic to attack on a laptop. I'm also interested in other ...
David 天宇 Wong's user avatar
1 vote
0 answers
59 views

Suppose I have two unknown elements of a ring $\mathbb{Z}_{2^n}$: $a$ and $b$. Their sum $s_1 = a+b$ is known. Let $x$ be some fixed known value with $m < n$ bits set to 1. What could I say about ...
Georgii Firsov's user avatar
0 votes
0 answers
73 views

In designing a MAC algorithm from scratch (don't lecture me, please), I was dissatisfied with what seemed to be patterns in the tags it generated. I figured this was a result of linearity or what have ...
Melab's user avatar
  • 4,328
3 votes
1 answer
145 views

I am new to cryptanalysis for SPN. In context of linear and differential cryptanalysis, I would like to know the following. How does one find the number of active S-boxes in a block cipher? Why does ...
Kurious Koder's user avatar
8 votes
1 answer
1k views

The S-boxes used in DES were carefully tuned for resistance against differential cryptanalysis, a technique not known to the public at that time but known to designers of DES. It was later discovered ...
juhist's user avatar
  • 1,643
1 vote
1 answer
116 views

I am talking about Symmetric Cryptography only in the following. We know that Semantic Security (in the presence of eavesdropper) implies security against message recovery (in the presence of ...
Alessio Proietti's user avatar
1 vote
0 answers
99 views

I am interested in the following snippet from the paper New Impossible Differential Attacks on AES. Analysis of Steps 3–4 of the 7-Round Attack in the 8-Round Attack The most time consuming steps of ...
can balıkçı's user avatar
3 votes
0 answers
83 views

I'm studying the paper: "Improved Impossible Differential Cryptanalysis of Rijndael and Crypton". I've got two questions: Please explain the calculation performed for step 5? Step 4 ...
can balıkçı's user avatar
2 votes
0 answers
64 views

For my version of this attack I used the FEAL4 version depicted here http://theamazingking.com/crypto-feal.php and in the book "Applied Cryptanalysis Breaking Ciphers in the Real World -- Mark ...
curious_cryptocopter's user avatar
1 vote
1 answer
88 views

What could we say about differential uniformity of (a vectorial Boolean function) $F = f+g \pmod 2$ (i.e. XOR) in terms of differential uniformity of $f$ and $g$?
Ranit Dutta's user avatar
0 votes
1 answer
83 views

I'm wondering if anyone is aware of the best input difference to input into the system Heys outlines in his paper (http://www.cs.bc.edu/~straubin/crypto2017/heys.pdf) to achieve a high probability ...
user115598's user avatar

15 30 50 per page
1
2 3 4 5
11