Cryptography Reference
In-Depth Information
Exercise 4
Perform a differential analysis of AES. How successful would you guess a standard differential attack against
AES might be based on this analysis?
Exercise 5
Attempt an impossible cryptanalysis attack against the cipher you created in Exercise 1. Try again with the
Feistel cipher in Exercise 2.
Exercise 6
Mount a boomerang attack against the cipher you created in Exercise 2, but extend the number of rounds to 16.
References
[1] I. Ben Aroya and E. Biham. Differential cryptanalysis of lucifer.
In Advances in Cryptology - Crypto '93,
(ed. Douglas R. Stinson), pp. 187-199. Lecture Notes in Computer Science, Vol. 773. (Springer-Verlag, Berlin,
1993).
[2] E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems (extended abstract). In
Ad-
vances in Cryptology - Crypto '90,
(eds. Alfred J. Menezes and Scott A. Vanstone), pp. 2-21. Lecture Notes in
Computer Science, Vol. 537. (Springer-Verlag, Berlin, 1990).
[3] E. Biham and A. Shamir. Differential cryptanalysis of Feal and N-hash. In
Advances in Cryptology - Eur-
oCrypt '91,
(ed. Donald W. Davies), pp. 1-16. Lecture Notes in Computer Science, Vol. 547. (Springer-Verlag,
Berlin, 1991).
[4]EliBiham,AlexBiryukov,andAdiShamir.Cryptanalysis ofskipjackreducedto31roundsusingimpossible
differentials.
Journal of Cryptology
18
(4): 291-311 (2005).
[5] Cipher A. Deavours and Louis Kruh.
Machine Cryptography and Modern Cryptanalysis,
Artech House
Telecom Library. (Artech House Publishers, Norwood, MA, 1985).
[6] Government Standard 28147-89. (Government of the USSR for Standards, 1989).
[7] Thomas Jakobsen and Lars R. Knudsen. The interpolation attack on block ciphers. In
Fast Software En-
cryption: 4th Interntional Workshop, FSE '97,
(ed. Eli Biham), Lecture Notes in Computer Science, pp.
28-40. Lecture Notes in Computer Science, Vol. 1267. (Springer-Verlag, Berlin, 1997);
ht-
[8] J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and
triple-DES. In
Advances in Cryptology - Crypto '96,
(ed. Neal Koblitz), pp. 237-251. Lecture Notes in Com-
puter Science, Vol. 1109. (Springer-Verlag, Berlin, 1996).
[9] Lars R. Knudsen. Truncated and higher order differentials. In
Fast Software Encryption: Second Interna-
tional Workshop, Leuven, Belgium, December 14-16, 1994,
(ed. Bart Preneel), pp. 196-211. Lecture Notes in
Search WWH ::
Custom Search