Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer

نویسندگان

چکیده

Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover entire state has recently gained attention due to favorable implementation characteristics in various scenarios.For word-oriented partial SPN (P-SPN) schemes with fixed linear layer, our goal is better understand how details of layer affect security construction. In this paper, we derive conditions that allow us either set up or prevent attacks based on infinitely long truncated differentials probability 1. Our analysis rather broad compared earlier independent work problem since consider (1) both invariant non-invariant/iterative trails, (2) trails without active S-boxes.For these cases, provide rigorous sufficient necessary for matrix defines analyzed attacks. On practical side, present tool can determine whether given vulnerable results. Furthermore, propose condition that, if satisfied, ensures no differential exists. This related degree irreducibility minimal polynomial layer. Besides P-SPN schemes, observations may also have crucial impact Hades design strategy, which mixes rounds full S-box layers layers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proving Resistance Against Invariant Attacks: How to Choose the Round Constants

Many lightweight block ciphers apply a very simple key schedule in which the round keys only differ by addition of a roundspecific constant. Generally, there is not much theory on how to choose appropriate constants. In fact, several of those schemes were recently broken using invariant attacks, i.e., invariant subspace or nonlinear invariant attacks. This work analyzes the resistance of such c...

متن کامل

How to Choose a Mentor?

Mentorship programs have been found to be of great use in all career fields, especially medicine. Given that the practice of medicine is best learnt by a hands-on training, a mentorship program can prove invaluable for the young clinician scientist. A structured super-speciality training program can help in both, acquisition of clinical and research skills, as well as career growth. How to cite...

متن کامل

How to Choose the Right Cloud

Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers, and outsources the “applications” (hardware and software) as services over the Internet. Cloud computing promises to increase the velocity with which applications are deployed, increase innovation, and lower costs, all while increasing business agility. But, is the m...

متن کامل

How to Choose the Right Mate

Genetically programmed recombination plays an important role in differentiation, antigenic variation, and evolution in many systems. Mating-type switching is an example of programmed recombination, and studies of both the budding yeast [1] and fission yeast [2] have provided a wealth of knowledge on how epigenetic and genetic machineries interact with each other to control this process. Fission...

متن کامل

How to Choose the Appropriate Statistical Method

APRIL 2005 • VOLUME 9, NUMBER 2 • CLINICAL JOURNAL OF ONCOLOGY NURSING This is the second in a series of articles to help nurses use and understand statistics. The purpose of the series is to assist nurses in critically reviewing published studies and implementing the fi ndings of research into clinical practice. The fi rst article addressed basic statistical considerations and types of variabl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2021

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2021.i2.314-352