New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair

نویسندگان

چکیده

Cryptanalysis of the LowMC block cipher when attacker has access to a single known plaintext/ciphertext pair is mathematically challenging problem. This because unable employ most standard techniques in symmetric cryptography like linear and differential cryptanalysis. scenario particularly relevant while arguing security PICNIC digital signature scheme which generated by serves as public (verification) key corresponding encryption also secret (signing) scheme. In paper Banik et al. (IACR ToSC 2020:4), authors used linearization technique S-box mount attacks on some instances cipher. this paper, we first make more precise complexity analysis attack. Then, show how perform 2-stage MITM attack LowMC. The stage reduces candidates fraction bits master key. second between reduced candidate set remaining successfully recovers We that combined computational both these stages significantly lower than those reported

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimized Interpolation Attacks on LowMC

LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. A unique feature of LowMC is that its internal affine layers are chosen at random, and thus each block cipher family contains a huge number of instances. The Eurocrypt paper ...

متن کامل

Attacks on the Rsa Cryptosystem and Some of Its Instances

Two types of attacking the RSA cryptosystem are discussed. The rst aims at a careless choice of the primes p and q, which are the basis of RSA security. Choosing these primes carefully can prevent the cryptosystem from this type of attack. The second aims at special instances of RSA-based cryptographical protocols. Speciic properties of these protocols enable users of the system or even outside...

متن کامل

New Instances for the Single Machine Total Weighted Tardiness Problem

Previous research in the single machine total weighted tardiness problem (SMTWTP) has led to the proposition of effective local search strategies. At least existing benchmark instances from the literature do not pose a challenge for state-of-the-art algorithms. This paper describes the proposition of two classes of novel instances for the single machine total weighted tardiness problem. In resp...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-92062-3_11