Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials

From MaRDI portal
Publication:4250749

DOI10.1007/3-540-48910-X_2zbMath0927.94013OpenAlexW1541703086WikidataQ27942592 ScholiaQ27942592MaRDI QIDQ4250749

Adi Shamir, Eli Biham, Alex Biryukov

Publication date: 5 October 1999

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48910-x_2




Related Items (97)

Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipherNew Insights on Impossible Differential Cryptanalysis\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementationsWARP: revisiting GFN for lightweight 128-bit block cipherImpossible Differential Cryptanalysis of Reduced-Round Tweakable TWINESecurity evaluation of MISTY structure with SPN round functionSEA: A Scalable Encryption Algorithm for Small Embedded ApplicationseSPF: A Family of Format-Preserving Encryption Algorithms Using MDS MatricesDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersDifferential-ML distinguisher: machine learning based generic extension for differential cryptanalysisImpossible differential cryptanalysis of advanced encryption standardRelated-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3Pholkos -- efficient large-state tweakable block ciphers from the AES round functionZero-correlation attacks: statistical models independent of the number of approximationsA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisCapability of evolutionary cryptosystems against differential cryptanalysisA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisMultiple (truncated) differential cryptanalysis: explicit upper bounds on data complexityDifferential-linear cryptanalysis revisitedSecurity analysis of SIMECK block cipher against related-key impossible differentialImproved Top-Down Techniques in Differential CryptanalysisCryptanalysis of the Full 8.5-Round REESSE3+ Block CipherOut of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic MatrixImpossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class PermutationCUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to MaskGeneralized Feistel networks revisitedStructural evaluation of AES-like ciphers against mixture differential cryptanalysisNonlinear Invariant AttackFinding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacksTruncated differential properties of the diagonal set of inputs for 5-round AESModeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128Password Recovery on Challenge and Response: Impossible Differential Attack on Hash FunctionSimpira v2: A Family of Efficient Permutations Using the AES Round FunctionNew automatic search tool for searching for impossible differentials using undisturbed bitsDifferential cryptanalysis of round-reduced \texttt{SPEEDY} familyMind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}Impossible differential cryptanalysis on reduced-round PRINCEcoreAnalysis of \(3\)-line generalized Feistel networks with double SD-functionsA unified method for finding impossible differentials of block cipher structuresAccurate estimates of the data complexity and success probability for various cryptanalysesMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsImpossible differential attacks on 13-round CLEFIA-128The phantom of differential characteristicsThe higher-order meet-in-the-middle attack and its application to the Camellia block cipherImpossible Differential Cryptanalysis of CLEFIALinear hulls with correlation zero and linear cryptanalysis of block ciphersImpossible Differentials of SPN CiphersSPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsOn computational complexity of impossible differential cryptanalysisObstacle Numbers of Planar GraphsExperimental Evaluation of Book Drawing AlgorithmsCryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006New Results on Impossible Differential Cryptanalysis of Reduced AESVariants of the AES key schedule for better truncated differential boundsDifferential attacks: using alternative operationsAKF: a key alternating Feistel scheme for lightweight cipher designsBounding the length of impossible differentials for SPN block ciphersIntegrals Go Statistical: Cryptanalysis of Full Skipjack VariantsNote on Impossible Differential AttacksLBlock: A Lightweight Block CiphersLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitivesImproving impossible-differential attacks against Rijndael-160 and Rijndael-224Antiderivative functions over \(\mathbb{F}_{2^n}\)Making the impossible possibleOn probability of success in linear and differential cryptanalysisImpossible differential cryptanalysis using matrix methodA New Structural-Differential Property of 5-Round AESThe (related-key) impossible boomerang attack and its application to the AES block cipherNonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64On the structure of SkipjackNew results on the genetic cryptanalysis of TEA and reduced-round versions of XTEAAn Improved Impossible Differential Attack on MISTY1Related-Key Differential-Linear Attacks on Reduced AES-192Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1Provable Security against Impossible Differential Cryptanalysis Application to CS-CipherСпектрально-линейный и спектрально-дифференциальный методы построения S-бокcов с близкими к оптимальным значениями криптографических параметровNew representations of the AES key schedule\textsc{Ciminion}: symmetric encryption based on Toffoli-gates over large finite fieldsImpossible Differential Cryptanalysis of Reduced-Round SKINNYImpossible Differential Attack on Reduced Round SPARX-64/128Wide Trail Design Strategy for Binary MixColumnsOn the (im)possibility of improving the round diffusion of generalized Feistel structuresImproved Impossible Differential Cryptanalysis of Reduced-Round CamelliaThe SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTISAutomatic Search of Meet-in-the-Middle and Impossible Differential AttacksSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsNew Insights on AES-Like SPN CiphersProvable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structuresUnnamed ItemUnnamed ItemUnnamed ItemNew Impossible Differential Attacks on AESMore accurate results on the provable security of AES against impossible differential cryptanalysisImpossible differential attack on 13-round Camellia-192New Impossible Differential Search Tool from Design and Cryptanalysis AspectsOn a generalization of substitution-permutation networks: the HADES design strategy




This page was built for publication: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials