메뉴 건너뛰기




Volumn 5086 LNCS, Issue , 2008, Pages 97-115

Algebraic and slide attacks on KeeLoq

Author keywords

Algebraic cryptanalysis; Block ciphers; Gr bner bases; KeeLoq; SAT solvers; Slide attacks; Unbalanced Feistel ciphers

Indexed keywords

INTEGRATED CIRCUITS;

EID: 50249137714     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71039-4_6     Document Type: Conference Paper
Times cited : (82)

References (39)
  • 2
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 3
    • 84957610784 scopus 로고    scopus 로고
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
  • 6
    • 78049233064 scopus 로고    scopus 로고
    • Linear Slide Attacks on the KeeLoq Block Cipher
    • The 3rd SKLOIS Conference on Information Security and Cryptology Inscrypt, Springer, Heidelberg
    • Bogdanov, A.: Linear Slide Attacks on the KeeLoq Block Cipher. In: The 3rd SKLOIS Conference on Information Security and Cryptology (Inscrypt 2007). LNCS. Springer, Heidelberg (2007)
    • (2007) LNCS
    • Bogdanov, A.1
  • 7
    • 38149133175 scopus 로고    scopus 로고
    • Cid, C., Babbage, S., Pramstaller, N., Raddum, H.: An Analysis of the Hermes8 Stream Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, 4586, pp. 1-10. Springer, Heidelberg (2007)
    • Cid, C., Babbage, S., Pramstaller, N., Raddum, H.: An Analysis of the Hermes8 Stream Cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 1-10. Springer, Heidelberg (2007)
  • 8
    • 50249136190 scopus 로고    scopus 로고
    • Keeloq wikipedia article. On 25 January 2007 the specification given here was incorrect and was updated since, http://en.wikipedia.org/wiki/KeeLoq
    • Keeloq wikipedia article. On 25 January 2007 the specification given here was incorrect and was updated since, http://en.wikipedia.org/wiki/KeeLoq
  • 9
    • 50249144191 scopus 로고    scopus 로고
    • Keeloq C source code by Ruptor, http://cryptolib.com/ciphers/
    • Keeloq C source code by Ruptor, http://cryptolib.com/ciphers/
  • 11
    • 35248834096 scopus 로고    scopus 로고
    • Courtois, N., Patarin, J.: About the XL Algorithm over GF(2). In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, pp. 141-157. Springer, Heidelberg (2003)
    • Courtois, N., Patarin, J.: About the XL Algorithm over GF(2). In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 141-157. Springer, Heidelberg (2003)
  • 12
    • 77649327985 scopus 로고    scopus 로고
    • Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392-407. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 392-407
    • Courtois, N.1    Shamir, A.2    Patarin, J.3    Klimov, A.4
  • 13
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
    • Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
    • Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 14
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic Attacks on Stream Ciphers with Linear Feedback
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 345-359. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 15
    • 24144472488 scopus 로고    scopus 로고
    • Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 67-83. Springer, Heidelberg (2005)
    • Courtois, N.: General Principles of Algebraic Attacks and New Design Criteria for Components of Symmetric Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 67-83. Springer, Heidelberg (2005)
  • 16
    • 24144445102 scopus 로고    scopus 로고
    • Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, 3373, pp. 170-188. Springer, Heidelberg (2005)
    • Courtois, N.: The Inverse S-box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 170-188. Springer, Heidelberg (2005)
  • 17
    • 50249182212 scopus 로고    scopus 로고
    • How Fast can be Algebraic Attacks on Block Ciphers?
    • Biham, E, Handschuh, H, Lucks, S, Rijmen, V, eds, January 07-12, 2007, ISSN 1862, 4405, http://eprint.iacr.org/2006/168
    • Courtois, N.T.: How Fast can be Algebraic Attacks on Block Ciphers? In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) online proceedings of Dagstuhl Seminar 07021, Symmetric Cryptography (January 07-12, 2007), http://drops.dagstuhl.de/portals/index.php?semnr=07021, http://eprint.iacr.org/ 2006/168/ ISSN 1862 - 4405
    • online proceedings of Dagstuhl Seminar 07021, Symmetric Cryptography
    • Courtois, N.T.1
  • 19
    • 50249101780 scopus 로고    scopus 로고
    • Courtois, N., Bard, G.V.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Cryptography and Coding, 11-th IMA Conference, Cirencester, UK, December 18-20, 2007. Springer, Heidelberg (2007), eprint.iacr.org/2006/402/; Also presented at ECRYPT workshop Tools for Cryptanalysis, Krakow, September 24-25 (2007)
    • Courtois, N., Bard, G.V.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Cryptography and Coding, 11-th IMA Conference, Cirencester, UK, December 18-20, 2007. Springer, Heidelberg (2007), eprint.iacr.org/2006/402/; Also presented at ECRYPT workshop Tools for Cryptanalysis, Krakow, September 24-25 (2007)
  • 21
    • 50249184170 scopus 로고    scopus 로고
    • Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq, Older preprint with using incorrect specification of KeeLoq, eprint.iacr.org/2007/062/
    • Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq, Older preprint with using incorrect specification of KeeLoq, eprint.iacr.org/2007/062/
  • 23
    • 50249133278 scopus 로고    scopus 로고
    • Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to Steal Cars - A Practical Attack on KeeLoq, Crypto 2007, rump session talk (2007); Full paper will be presented at Eurocrypt 2008 and published in Springer LNCS, http://www.cosic.esat.kuleuven.be/keeloq/keeloq-rump.pdf
    • Biham, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B.: How to Steal Cars - A Practical Attack on KeeLoq, Crypto 2007, rump session talk (2007); Full paper will be presented at Eurocrypt 2008 and published in Springer LNCS, http://www.cosic.esat.kuleuven.be/keeloq/keeloq-rump.pdf
  • 25
    • 84925121989 scopus 로고    scopus 로고
    • Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 807 pages. Cambridge University Press, Cambridge (to appear, 2008), http://algo.inria.fr/flajolet/ Publications/book.pdf
    • Flajolet, P., Sedgewick, R.: Analytic Combinatorics, 807 pages. Cambridge University Press, Cambridge (to appear, 2008), http://algo.inria.fr/flajolet/ Publications/book.pdf
  • 26
    • 35248898342 scopus 로고    scopus 로고
    • Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks
    • Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
    • Phan, R.C.-W., Furuya, S.: Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 138-148. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2587 , pp. 138-148
    • Phan, R.C.-W.1    Furuya, S.2
  • 27
    • 84949982494 scopus 로고    scopus 로고
    • Slide Attacks with a Known-Plaintext Cryptanalysis
    • Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
    • Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 214-225. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2288 , pp. 214-225
    • Furuya, S.1
  • 28
    • 38149057656 scopus 로고    scopus 로고
    • Granboulan, L., Pornin, T.: Perfect Block Ciphers with Small Blocks. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 452-465. Springer, Heidelberg (2007)
    • Granboulan, L., Pornin, T.: Perfect Block Ciphers with Small Blocks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 452-465. Springer, Heidelberg (2007)
  • 30
    • 85037173808 scopus 로고
    • Analysis of a Feistel-like cipher weakened by having no rotating key, IBM Thomas J
    • 6375
    • Grossman, E.K., Tuckerman, B.: Analysis of a Feistel-like cipher weakened by having no rotating key, IBM Thomas J. Watson Research Report RC 6375 (1977)
    • (1977) Watson Research Report RC
    • Grossman, E.K.1    Tuckerman, B.2
  • 31
    • 50249125510 scopus 로고    scopus 로고
    • Kahn, D.: The Codebreakers, The Comprehensive History of Secret Communication from Ancient Times to the Internet (first published in 1967) (new chapter added in 1996)
    • Kahn, D.: The Codebreakers, The Comprehensive History of Secret Communication from Ancient Times to the Internet (first published in 1967) (new chapter added in 1996)
  • 37
    • 33749578685 scopus 로고    scopus 로고
    • Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254
    • Mironov, I., Zhang, L.: Applications of SAT Solvers to Cryptanalysis of Hash Functions. In: Biere, A., Gomes, C.P. (eds.) SAT 2006. LNCS, vol. 4121, pp. 102-115. Springer, Heidelberg (2006), http://eprint.iacr.org/2006/254


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.