Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
From MaRDI portal
Publication:4250749
DOI10.1007/3-540-48910-X_2zbMath0927.94013OpenAlexW1541703086WikidataQ27942592 ScholiaQ27942592MaRDI QIDQ4250749
Adi Shamir, Eli Biham, Alex Biryukov
Publication date: 5 October 1999
Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-48910-x_2
Related Items (97)
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher ⋮ New Insights on Impossible Differential Cryptanalysis ⋮ \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE ⋮ Security evaluation of MISTY structure with SPN round function ⋮ SEA: A Scalable Encryption Algorithm for Small Embedded Applications ⋮ eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis ⋮ Impossible differential cryptanalysis of advanced encryption standard ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Pholkos -- efficient large-state tweakable block ciphers from the AES round function ⋮ Zero-correlation attacks: statistical models independent of the number of approximations ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Capability of evolutionary cryptosystems against differential cryptanalysis ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity ⋮ Differential-linear cryptanalysis revisited ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Improved Top-Down Techniques in Differential Cryptanalysis ⋮ Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher ⋮ Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix ⋮ Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation ⋮ CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask ⋮ Generalized Feistel networks revisited ⋮ Structural evaluation of AES-like ciphers against mixture differential cryptanalysis ⋮ Nonlinear Invariant Attack ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ Truncated differential properties of the diagonal set of inputs for 5-round AES ⋮ Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128 ⋮ Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ New automatic search tool for searching for impossible differentials using undisturbed bits ⋮ Differential cryptanalysis of round-reduced \texttt{SPEEDY} family ⋮ Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} ⋮ Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} ⋮ Impossible differential cryptanalysis on reduced-round PRINCEcore ⋮ Analysis of \(3\)-line generalized Feistel networks with double SD-functions ⋮ A unified method for finding impossible differentials of block cipher structures ⋮ Accurate estimates of the data complexity and success probability for various cryptanalyses ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Impossible differential attacks on 13-round CLEFIA-128 ⋮ The phantom of differential characteristics ⋮ The higher-order meet-in-the-middle attack and its application to the Camellia block cipher ⋮ Impossible Differential Cryptanalysis of CLEFIA ⋮ Linear hulls with correlation zero and linear cryptanalysis of block ciphers ⋮ Impossible Differentials of SPN Ciphers ⋮ SPF: A New Family of Efficient Format-Preserving Encryption Algorithms ⋮ On computational complexity of impossible differential cryptanalysis ⋮ Obstacle Numbers of Planar Graphs ⋮ Experimental Evaluation of Book Drawing Algorithms ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ New Results on Impossible Differential Cryptanalysis of Reduced AES ⋮ Variants of the AES key schedule for better truncated differential bounds ⋮ Differential attacks: using alternative operations ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Bounding the length of impossible differentials for SPN block ciphers ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ Note on Impossible Differential Attacks ⋮ LBlock: A Lightweight Block Cipher ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 ⋮ Antiderivative functions over \(\mathbb{F}_{2^n}\) ⋮ Making the impossible possible ⋮ On probability of success in linear and differential cryptanalysis ⋮ Impossible differential cryptanalysis using matrix method ⋮ A New Structural-Differential Property of 5-Round AES ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 ⋮ On the structure of Skipjack ⋮ New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 ⋮ Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher ⋮ Спектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметров ⋮ New representations of the AES key schedule ⋮ \textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fields ⋮ Impossible Differential Cryptanalysis of Reduced-Round SKINNY ⋮ Impossible Differential Attack on Reduced Round SPARX-64/128 ⋮ Wide Trail Design Strategy for Binary MixColumns ⋮ On the (im)possibility of improving the round diffusion of generalized Feistel structures ⋮ Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia ⋮ The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS ⋮ Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ New Insights on AES-Like SPN Ciphers ⋮ Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ New Impossible Differential Attacks on AES ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ Impossible differential attack on 13-round Camellia-192 ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects ⋮ On a generalization of substitution-permutation networks: the HADES design strategy
This page was built for publication: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials