New types of cryptanalytic attacks using related keys
From MaRDI portal
Publication:1340196
DOI10.1007/BF00203965zbMath0812.94012OpenAlexW1991897749WikidataQ59663184 ScholiaQ59663184MaRDI QIDQ1340196
Publication date: 30 January 1995
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf00203965
cryptanalytic attackscryptosystemsdata encryption standardDES-like cryptosystemschosen key attackschosen plaintext attackskey-scheduling algorithmsLOKI
Related Items (56)
Related-key analysis of generalized Feistel networks with expanding round functions ⋮ Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64 ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms ⋮ Multi-key Security: The Even-Mansour Construction Revisited ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ Efficient slide attacks ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials ⋮ Secure Message Authentication Against Related-Key Attack ⋮ The DBlock family of block ciphers ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Key structures: improved related-key boomerang attack against the full AES-256 ⋮ Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128 ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ A practical attack on KeeLoq ⋮ Related-key differential cryptanalysis of GMiMC used in post-quantum signatures ⋮ Critique of the related-key attack concept ⋮ A Unified Approach to Related-Key Attacks ⋮ Tweakable block ciphers ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ The design of the ICE encryption algorithm ⋮ Serpent: A New Block Cipher Proposal ⋮ A methodology for differential-linear cryptanalysis and its applications ⋮ LBlock: A Lightweight Block Cipher ⋮ On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher ⋮ New related-key rectangle attacks on reduced AES-192 and AES-256 ⋮ Slide Attacks on a Class of Hash Functions ⋮ Clever Arbiters Versus Malicious Adversaries ⋮ Reflection cryptanalysis of PRINCE-like ciphers ⋮ Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ A Practical Attack on KeeLoq ⋮ Expedient Non-malleability Notions for Hash Functions ⋮ Related-Key Attack on Full-Round PICARO ⋮ Key distribution. Episode 1: Quantum menace ⋮ New slide attacks on almost self-similar ciphers ⋮ Attacking 9 and 10 Rounds of AES-256 ⋮ Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT ⋮ Provable related-key security of contracting Feistel networks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ On Related-Secret Pseudorandomness ⋮ Unnamed Item ⋮ New Related-Key Boomerang Attacks on AES ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ A Differential-Linear Attack on 12-Round Serpent ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE ⋮ Side channel cryptanalysis of product ciphers ⋮ Improved BV-based quantum attack on block ciphers ⋮ Простейшие надгруппы регулярных представлений неабелевых $2$-групп с циклической подгруппой индекса $2$
Cites Work
This page was built for publication: New types of cryptanalytic attacks using related keys