Breaking the Symmetry: a Way to Resist the New Differential Attack
نویسندگان
چکیده
sflash had recently been broken by Dubois, Stern, Shamir, etc., using a differential attack on the public key. The C∗− signature schemes are hence no longer practical. In this paper, we will study the new attack from the point view of symmetry, then (1) present a simple concept (projection) to modify several multivariate schemes to resist the new attacks; (2) demonstrate with practical examples that this simple method could work well; and (3) show that the same discussion of attack-and-defence applies to other big-field multivariates. The speed of encryption schemes is not affected, and we can still have a big-field multivariate signatures resisting the new differential attacks with speeds comparable to sflash.
منابع مشابه
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملA Computational Study to Find the Vibrational Modes Connected with Specific Molecular Structures of Calculated Compound
The purpose of this research is to provide a deeper understanding of the planar high- symmetry configuration instability. In the ideal case, the distortion corresponds to the movements of nuclei along normal modes that belong to non-totally symmetric irreps of the high symmertry (HS) point group of molecule. The analysis of the structural distortion from the HS nuclear arrangements of the JT ac...
متن کاملRelaxed Differential Fault Analysis of SHA-3
In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...
متن کاملSymmetry and symmetry breaking in cancer: a foundational approach to the cancer problem
Symmetry and symmetry breaking concepts from physics and biology are applied to the problem of cancer. Three categories of symmetry breaking in cancer are examined: combinatorial, geometric, and functional. Within these categories, symmetry breaking is examined for relevant cancer features, including epithelial-mesenchymal transition (EMT); tumor heterogeneity; tensegrity; fractal geometric and...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007