Linear Propagation in Efficient Guess-and-Determine Attacks

Maria Eichlseder, Florian Mendel, Tomislav Nad, Vincent Rijmen, Martin Schläffer

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

The most successful attacks on cryptographic hash functions are based
on differential cryptanalysis, where the main problem is to find a differential char-
acteristic. Finding a differential characteristic is equivalent to solving a system
of nonlinear equations. Solving these equations is usually done by a guess-and-
determine approach. Recently, automated tools performing a guess-and-determine
approach based on the concept of generalized conditions have been used to attack
many hash functions. The core part of such tools is the propagation of informa-
tion. In this paper, we propose a new approach to propagate information for affine
functions and compare it to the approach used in recent hash function attacks.
We apply our method to the linear functions σi and Σi used in SHA-2 and to the
linear layer of SHA-3. We show that our approach performs much better than the
previously used methods.
Originalspracheenglisch
TitelInternational Workshop on Coding and Cryptography
Seiten193-202
PublikationsstatusVeröffentlicht - 2013
Veranstaltung2013 International Workshop on Coding and Cryptography: WCC2 013 - Bergen, Norwegen
Dauer: 15 Apr. 201319 Apr. 2013

Konferenz

Konferenz2013 International Workshop on Coding and Cryptography
KurztitelWCC2 013
Land/GebietNorwegen
OrtBergen
Zeitraum15/04/1319/04/13

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Untersuchen Sie die Forschungsthemen von „Linear Propagation in Efficient Guess-and-Determine Attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren