Higher order differentiation over finite fields with applications to generalising the cube attack

نویسندگان

  • Ana Salagean
  • Richard Winter
  • Matei Mandache-Salagean
  • Raphael C.-W. Phan
چکیده

Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack and the AIDA attack. All of the above have been developed for the binary case. We examine differentiation in larger fields, starting with the field GF(p) of integers modulo a prime p. We prove a number of results on differentiating polynomials over such fields and then apply these techniques to generalising the cube attack to GF(p). The crucial difference is that now the degree in each variable can be higher than one, and our proposed attack will differentiate several times with respect to each variable (unlike the classical cube attack and its larger field version described by Dinur and Shamir, both of which differentiate at most once with respect to each variable). Finally we describe differentiation over finite fields GF(pm) with pm elements and prove that it can be reduced to differentiation over GF(p), so a cube attack over GF(pm) would be equivalent to cube attacks over GF(p).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cube Attack in Finite Fields of Higher Order

We present in full details a version of the DinurShamir Cube Attack (Dinur & Shamir 2009) for a generic finite field of order q. In particular, when applied to multivariate monomials of degree d in k < d variables, the attack acts exactly in the same way if the selected monomial was using the degree k monomial in the same k variables.

متن کامل

Comparison of Cube Attacks Over Different Vector Spaces

We generalise the cube attack of Dinur and Shamir (and the similar AIDA attack of Vielhaber) to a more general higher order differentiation attack, by summing over an arbitrary subspace of the space of initialisation vectors. The Moebius transform can be used for efficiently examining all the subspaces of a big space, similar to the method used by Fouque and Vannet for the usual cube attack. Se...

متن کامل

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

Numerical Study of Reynolds Number Effects on Flow over a Wall-Mounted Cube in a Channel Using LES

Turbulent flow over wall-mounted cube in a channel was investigated numerically using Large Eddy Simulation. The Selective Structure Function model was used to determine eddy viscosity that appeared in the subgrid scale stress terms in momentum equations. Studies were carried out for the flows with Reynolds number ranging from 1000 to 40000. To evaluate the computational results, data was compa...

متن کامل

Another View on Cube Attack, Cube Tester, AIDA and Higher Order Differential Cryptanalysis

This paper introduces a more in-depth cryptanalysis framework for tweakable cryptosystems than Cube Attack, Cube Tester, algebraic IV differential attack (AIDA), and higher order differential cryptanalysis in Boolean algebra. Through the view of the new framework, the differences among these existing analysis methods are clarified. Furthermore, a principle is proposed to design secure systems a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 84  شماره 

صفحات  -

تاریخ انتشار 2017