메뉴 건너뛰기




Volumn 4887 LNCS, Issue , 2007, Pages 152-169

Algebraic cryptanalysis of the data encryption standard

Author keywords

AES; Algebraic cryptanalysis; Block ciphers; DES; Elim lin algorithm; Gr bner bases; Logical cryptanalysis; s5DES; SAT solvers; Solving overdefined and sparse systems of multivariate equations

Indexed keywords

COMPUTER CRIME; PERSONAL COMPUTERS; SECURITY OF DATA;

EID: 38149068190     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-77272-9_10     Document Type: Conference Paper
Times cited : (130)

References (44)
  • 3
    • 38149128896 scopus 로고    scopus 로고
    • Augot, D., Biryukov, A., Canteaut, A., Cid, C., Courtois, N., Cannière, C.D., Gilbert, H., Lauradoux, C., Parker, M., Preneel, B., Robshaw, M., Seurin, Y.: AES Security Report, D.STVL.2 report, IST-2002-507932 ECRYPT European Network of Excellence in Cryptology, www.ecrypt.eu.org/ documents/D.STVL.2-1.0.pdf
    • Augot, D., Biryukov, A., Canteaut, A., Cid, C., Courtois, N., Cannière, C.D., Gilbert, H., Lauradoux, C., Parker, M., Preneel, B., Robshaw, M., Seurin, Y.: AES Security Report, D.STVL.2 report, IST-2002-507932 ECRYPT European Network of Excellence in Cryptology, www.ecrypt.eu.org/ documents/D.STVL.2-1.0.pdf
  • 4
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology (IACR) 4, 3-72 (1991)
    • (1991) Journal of Cryptology (IACR) , vol.4 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 5
    • 85034623360 scopus 로고
    • Cryptanalysis of DES with a Reduced Number of Rounds
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 192-211
    • Chaum, D.1    Evertse, J.-H.2
  • 6
    • 21144445497 scopus 로고    scopus 로고
    • Tardy-Corfdir, A., Gilbert, H.: A Known Plaintext Attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, 576, pp. 172-181. Springer, Heidelberg (1992)
    • Tardy-Corfdir, A., Gilbert, H.: A Known Plaintext Attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 172-181. Springer, Heidelberg (1992)
  • 7
    • 38149042351 scopus 로고    scopus 로고
    • The development of DES, Invited Talk
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Coppersmith, D.: The development of DES, Invited Talk. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880
    • Coppersmith, D.1
  • 9
    • 24144472488 scopus 로고    scopus 로고
    • Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 67-83. Springer, Heidelberg (2005)
    • Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 67-83. Springer, Heidelberg (2005)
  • 10
    • 85005999755 scopus 로고    scopus 로고
    • How Fast can be Algebraic Attacks on Block Ciphers?
    • Biham, E, Handschuh, H, Lucks, S, Rijmen, V, eds, January 07-12
    • Courtois, N.T.: How Fast can be Algebraic Attacks on Block Ciphers? In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography (January 07-12, 2007), http://drops.dagstuhl.de/portals/index.php?semnr=07021
    • (2007) Symmetric Cryptography
    • Courtois, N.T.1
  • 12
    • 77649327985 scopus 로고    scopus 로고
    • Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 392-407
    • Courtois, N.1    Shamir, A.2    Patarin, J.3    Klimov, A.4
  • 13
    • 84937560136 scopus 로고    scopus 로고
    • Courtois, N.: The security of Hidden Field Equations (HFE). In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 266-281. Springer, Heidelberg (2001)
    • Courtois, N.: The security of Hidden Field Equations (HFE). In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 266-281. Springer, Heidelberg (2001)
  • 14
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 17
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic Attacks on Stream Ciphers with Linear Feedback
    • Biham, E, ed, Eurocrypt 2003, Springer, Heidelberg
    • Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) Eurocrypt 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 19
    • 35248849880 scopus 로고    scopus 로고
    • Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Courtois, N.: Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 177-194. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 177-194
    • Courtois, N.1
  • 20
    • 24944457137 scopus 로고    scopus 로고
    • Courtois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, Springer, Heidelberg (2005), http://eprint.iacr.org/2003/125/
    • Courtois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, Springer, Heidelberg (2005), http://eprint.iacr.org/2003/125/
  • 21
    • 24144445102 scopus 로고    scopus 로고
    • The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
    • Dobbertin, H, Rijmen, V, Sowa, A, eds, AES 4 Conference, Bonn, Springer, Heidelberg
    • Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 4 Conference, Bonn. LNCS, vol. 3373, pp. 170-188. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3373 , pp. 170-188
    • Courtois, N.1
  • 22
    • 35248834096 scopus 로고    scopus 로고
    • Courtois, N., Patarin, J.: About the XL Algorithm over GF(2), Cryptographers. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 141-157. Springer, Heidelberg (2003)
    • Courtois, N., Patarin, J.: About the XL Algorithm over GF(2), Cryptographers. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 141-157. Springer, Heidelberg (2003)
  • 23
    • 38149007499 scopus 로고    scopus 로고
    • Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical Characteristics of the DES. In: Crypto 1983, pp. 171-202. Plenum Press, New York (1984)
    • Davio, M., Desmedt, Y., Fosseprez, M., Govaerts, R., Hulsbosch, J., Neutjens, P., Piret, P., Quisquater, J.-J., Vandewalle, J., Wouters, P.: Analytical Characteristics of the DES. In: Crypto 1983, pp. 171-202. Plenum Press, New York (1984)
  • 24
    • 24144491738 scopus 로고    scopus 로고
    • A new efficient algorithm for computing Gröbner bases without reduction to zero (F5)
    • Catania, Italy, 3-6 April, ACM Press, New York
    • Faugère, J.C.: A new efficient algorithm for computing Gröbner bases without reduction to zero (F5). In: Workshop on Applications of Commutative Algebra, Catania, Italy, 3-6 April 2002, ACM Press, New York (2002)
    • (2002) Workshop on Applications of Commutative Algebra
    • Faugère, J.C.1
  • 27
    • 35248840150 scopus 로고    scopus 로고
    • Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Joux, A., Faugère, J.-C.: Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 44-60. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 44-60
    • Joux, A.1    Faugère, J.-C.2
  • 28
    • 84957694404 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Jakobsen, T.: Cryptanalysis of Block Ciphers with Probabilistic Non-Linear Relations of Low Degree. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 212-222. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 212-222
    • Jakobsen, T.1
  • 29
    • 38149002632 scopus 로고    scopus 로고
    • Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes against Three Robust Cryptanalysis. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, 2595, pp. 145-157. Springer, Heidelberg (2003)
    • Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes against Three Robust Cryptanalysis. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 145-157. Springer, Heidelberg (2003)
  • 33
    • 0034140491 scopus 로고    scopus 로고
    • Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT-problem: Encoding and analysis of the U.SS. Data Encryption Standard. Journal of Automated Reasoning 24, 165-203 (2000). And In: Gent, J., van Maaren, H., Walsh, T. (eds.) The proceedings of SAT-2000 conference, Highlights of Satisfiability Research at the Year 2000, pp. 343-376. IOS Press, Amsterdam (2000)
    • Massacci, F., Marraro, L.: Logical cryptanalysis as a SAT-problem: Encoding and analysis of the U.SS. Data Encryption Standard. Journal of Automated Reasoning 24, 165-203 (2000). And In: Gent, J., van Maaren, H., Walsh, T. (eds.) The proceedings of SAT-2000 conference, Highlights of Satisfiability Research at the Year 2000, pp. 343-376. IOS Press, Amsterdam (2000)
  • 34
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method for DES Cipher
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 35
    • 57649214960 scopus 로고    scopus 로고
    • 2.0. An open-source SAT solver package
    • Eén, N., Sörensson, N.: MiniSat 2.0. An open-source SAT solver package, http://www.cs.Chalmers.se/Cs/Research/FormalMethods/MiniSat/
    • MiniSat
    • Eén, N.1    Sörensson, N.2
  • 36
    • 33749578685 scopus 로고    scopus 로고
    • Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
    • Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, vol. 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
  • 37
    • 84937413721 scopus 로고    scopus 로고
    • Essential Algebraic Structure within the AES
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Murphy, S., Robshaw, M.: Essential Algebraic Structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442
    • Murphy, S.1    Robshaw, M.2
  • 38
    • 84957640013 scopus 로고    scopus 로고
    • Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, 963, pp. 248-261. Springer, Heidelberg (1995)
    • Patarin, J.: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt 1988. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 248-261. Springer, Heidelberg (1995)
  • 40
    • 38149123689 scopus 로고    scopus 로고
    • Solving MRHS linear equations
    • Krakow, Poland September 24-25, accepted
    • Raddum, H., Semaev, I.: Solving MRHS linear equations. In: ECRYPT Tools for Cryptanalysis workshop, Krakow, Poland (September 24-25, 2007) (accepted)
    • (2007) ECRYPT Tools for Cryptanalysis workshop
    • Raddum, H.1    Semaev, I.2
  • 42
    • 1442325710 scopus 로고
    • On the security of DES
    • Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
    • Shamir, A.: On the security of DES. In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 280-281. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 280-281
    • Shamir, A.1
  • 43
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell System Technical Journal 28, 704 (1949)
    • (1949) Bell System Technical Journal , vol.28 , pp. 704
    • Shannon, C.E.1
  • 44
    • 0020928825 scopus 로고
    • Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding
    • Beth, T, ed, Cryptography, Springer, Heidelberg
    • Schaumuller-Bichl, I.: Cryptanalysis of the Data Encryption Standard by the Method of Formal Coding. In: Beth, T. (ed.) Cryptography. LNCS, vol. 149, Springer, Heidelberg (1983)
    • (1983) LNCS , vol.149
    • Schaumuller-Bichl, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.