Cryptography Reference
In-Depth Information
Exercise 4
Perform a differential analysis of AES. How successful would you guess a standard differential attack against
AES might be based on this analysis?
Exercise 5
Attempt an impossible cryptanalysis attack against the cipher you created in Exercise 1. Try again with the
Feistel cipher in Exercise 2.
Exercise 6
Mount a boomerang attack against the cipher you created in Exercise 2, but extend the number of rounds to 16.
References
[1] I. Ben Aroya and E. Biham. Differential cryptanalysis of lucifer. In Advances in Cryptology - Crypto '93,
(ed. Douglas R. Stinson), pp. 187-199. Lecture Notes in Computer Science, Vol. 773. (Springer-Verlag, Berlin,
1993).
[2] E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems (extended abstract). In Ad-
vances in Cryptology - Crypto '90, (eds. Alfred J. Menezes and Scott A. Vanstone), pp. 2-21. Lecture Notes in
Computer Science, Vol. 537. (Springer-Verlag, Berlin, 1990).
[3] E. Biham and A. Shamir. Differential cryptanalysis of Feal and N-hash. In Advances in Cryptology - Eur-
oCrypt '91, (ed. Donald W. Davies), pp. 1-16. Lecture Notes in Computer Science, Vol. 547. (Springer-Verlag,
Berlin, 1991).
[4]EliBiham,AlexBiryukov,andAdiShamir.Cryptanalysis ofskipjackreducedto31roundsusingimpossible
differentials. Journal of Cryptology 18 (4): 291-311 (2005).
[5] Cipher A. Deavours and Louis Kruh. Machine Cryptography and Modern Cryptanalysis, Artech House
Telecom Library. (Artech House Publishers, Norwood, MA, 1985).
[6] Government Standard 28147-89. (Government of the USSR for Standards, 1989).
[7] Thomas Jakobsen and Lars R. Knudsen. The interpolation attack on block ciphers. In Fast Software En-
cryption: 4th Interntional Workshop, FSE '97, (ed. Eli Biham), Lecture Notes in Computer Science, pp.
28-40. Lecture Notes in Computer Science, Vol. 1267. (Springer-Verlag, Berlin, 1997); ht-
tp://citeseer.ist.psu.edu/jakobsen97interpolation.html .
[8] J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and
triple-DES. In Advances in Cryptology - Crypto '96, (ed. Neal Koblitz), pp. 237-251. Lecture Notes in Com-
puter Science, Vol. 1109. (Springer-Verlag, Berlin, 1996).
[9] Lars R. Knudsen. Truncated and higher order differentials. In Fast Software Encryption: Second Interna-
tional Workshop, Leuven, Belgium, December 14-16, 1994, (ed. Bart Preneel), pp. 196-211. Lecture Notes in
Search WWH ::




Custom Search