Algebraic Cryptanalysis of the Data Encryption Standard
From MaRDI portal
Publication:5447514
DOI10.1007/978-3-540-77272-9_10zbMath1154.94386OpenAlexW2124509406MaRDI QIDQ5447514
Gregory V. Bard, Nicolas T. Courtois
Publication date: 7 March 2008
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77272-9_10
DESGröbner basesblock ciphersalgebraic cryptanalysisSAT solversAESlogical cryptanalysisElimLin algorithms\(^{5}\)DESsolving overdefined and sparse systems of multivariate equations
Symbolic computation and algebraic computation (68W30) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items (21)
MaxMinMax problem and sparse equations over finite fields ⋮ Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath ⋮ Local reduction and the algebraic cryptanalysis of the block cipher GOST ⋮ Side-channel cryptographic attacks using pseudo-Boolean optimization ⋮ Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two ⋮ Algebraic Analysis of the Simon Block Cipher Family ⋮ Algebraic Attacks Using Binary Decision Diagrams ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Using small-scale quantum devices to solve algebraic equations ⋮ Algebraic and Slide Attacks on KeeLoq ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Improved agreeing-gluing algorithm ⋮ Improved Meet-in-the-Middle Attacks on Reduced-Round DES ⋮ Unnamed Item ⋮ Formulations of some bit switching functions in DES ⋮ Practical Algebraic Attacks on the Hitag2 Stream Cipher ⋮ DRAT Proofs for XOR Reasoning ⋮ An algebraic attack to the Bluetooth stream cipher \textsc{E0} ⋮ Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts ⋮ A new representation of S-boxes for algebraic differential cryptanalysis ⋮ On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma
Cites Work
- Differential cryptanalysis of DES-like cryptosystems
- Solving multiple right hand sides linear equations
- Logical cryptanalysis as a SAT problem: Encoding and analysis of the U. S. Data Encryption Standard
- Algebraic and Slide Attacks on KeeLoq
- Communication Theory of Secrecy Systems*
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
- Analytical Characteristics of the DES
- Advanced Encryption Standard – AES
- Theory and Applications of Satisfiability Testing
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- Algebraic Attacks on Combiners with Memory and Several Outputs
- Applications of SAT Solvers to Cryptanalysis of Hash Functions
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Algebraic Cryptanalysis of the Data Encryption Standard