Another Look at Complementation Properties

نویسندگان

  • Charles Bouillaguet
  • Orr Dunkelman
  • Gaëtan Leurent
  • Pierre-Alain Fouque
چکیده

In this paper we present a collection of attacks based on generalisations of the complementation property of DES. We find symmetry relations in the key schedule and in the actual rounds, and we use these symmetries to build distinguishers for any number of rounds when the relation is deterministic. This can be seen as a generalisation of the complementation property of DES or of slide/related-key attacks, using different kinds of relations. We further explore these properties, and show that if the relations have easily found fixed points, a new kind of attacks can be applied. Our main result is a self-similarity property on the SHA-3 candidate Lesamnta , which gives a very surprising result on its compression function. Despite the use of round constants which were designed to thwart any such attack, we show a distinguisher on the full compression function which needs only one query, and works for any number of rounds. We also show how to use this self-similarity property to find collisions on the full compression function of Lesamnta much faster than generic attacks. The main reason for this is the structure found in these round constants, which introduce an interesting and unexpected symmetry relation. This casts some doubt on the use of highly structured constants, as it is the case in many designs, including the AES and several SHA-3 candidates. Our secondmain contribution is a new related-key differential attack on round-reduced versions of the XTEA block-cipher. We exploit the weakness of the key-schedule to suggest an iterative related-key differential. It can be used to recover the secret key faster than exhaustive search using two related keys on 37 rounds. We then isolate a big class of weak keys for which we can attack 51 rounds out of the cipher’s 64 rounds. We also apply our techniques to ESSENCE and PURE .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Another Look at the Hypocrisy of Chaucer’s Pardoner

For us, readers of Chaucer living in an age when appeal to religious passions and sentiments as a means for the realization of worldly objectives by some charlatans has grown significantly, reviewing the theme of religious hypocrisy treated in The Canterbury Tales can be useful in a way that it proves a helpful means for recognizing and dealing with the hypocrites. The Pardoner of the Tales is ...

متن کامل

A closer look at rock physics models and their assisted interpretation in seismic exploration

Subsurface rocks and their fluid content along with their architecture affect reflected seismic waves through variations in their travel time, reflection amplitude, and phase within the field of exploration seismology. The combined effects of these factors make subsurface interpretation by using reflection waves very difficult. Therefore, assistance from other subsurface disciplines is needed i...

متن کامل

A look at signification of ‘then’ in the Holy Quran

‘Then’ as one of conjunctions, has many usages in Arabic language. Since one of its usages is in the religious texts and the Holy Quran so that its different usages effect on the style, meaning, and concepts, and also, due to the sensitivity and significance of the Holy Quran, understanding the exact meaning of this conjunction, i.e. ‘then’, and studying its various stat...

متن کامل

Mirror theory : syntactic representation in perfect syntax

In the better developed sciences it is the departures from symmetry rather than the symmetries that are typically taken to be in need of explanation. Mirror theory is an attempt to look at some of the central properties of syntactic representations in this spirit. The core hypothesis of this theory is that in syntactic representations complementation expresses morphological structure: x is the ...

متن کامل

Isolation and Characterization of a New Peroxisome Deficient CHO Mutant Cell Belonging to Complementation Group 12

We searched for novel Chinese hamster ovary (CHO) cell mutants defective in peroxisome biogenesis by an improved method using peroxisome targeting sequence (PTS) of Pex3p (amino acid residues 1–40)-fused enhanced green fluorescent protein (EGFP). From mutagenized TKaEG3(1–40) cells, the wild-type CHO-K1 stably expressing rat Pex2p and of rat Pex3p(1–40)-EGFP, numerous cell colonies resistant to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010