Conditional Differential Cryptanalysis of Trivium and KATAN View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Simon Knellwolf , Willi Meier , María Naya-Plasencia

ABSTRACT

The concept of conditional differential cryptanalysis has been applied to NLFSR-based cryptosystems at ASIACRYPT 2010. We improve the technique by using automatic tools to find and analyze the involved conditions. Using these improvements we cryptanalyze the stream cipher Trivium and the KATAN family of lightweight block ciphers. For both ciphers we obtain new cryptanalytic results. For reduced variants of Trivium we obtain a class of weak keys that can be practically distinguished up to 961 of 1152 rounds. For the KATAN family we focus on its security in the related-key scenario and obtain practical key-recovery attacks for 120, 103 and 90 of 254 rounds of KATAN32, KATAN48 and KATAN64, respectively. More... »

PAGES

200-212

Book

TITLE

Selected Areas in Cryptography

ISBN

978-3-642-28495-3
978-3-642-28496-0

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_12

DOI

http://dx.doi.org/10.1007/978-3-642-28496-0_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020197941


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Knellwolf", 
        "givenName": "Simon", 
        "id": "sg:person.016510524306.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016510524306.72"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "The concept of conditional differential cryptanalysis has been applied to NLFSR-based cryptosystems at ASIACRYPT 2010. We improve the technique by using automatic tools to find and analyze the involved conditions. Using these improvements we cryptanalyze the stream cipher Trivium and the KATAN family of lightweight block ciphers. For both ciphers we obtain new cryptanalytic results. For reduced variants of Trivium we obtain a class of weak keys that can be practically distinguished up to 961 of 1152 rounds. For the KATAN family we focus on its security in the related-key scenario and obtain practical key-recovery attacks for 120, 103 and 90 of 254 rounds of KATAN32, KATAN48 and KATAN64, respectively.", 
    "editor": [
      {
        "familyName": "Miri", 
        "givenName": "Ali", 
        "type": "Person"
      }, 
      {
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-28496-0_12", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-28495-3", 
        "978-3-642-28496-0"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "KATAN family", 
      "lightweight block ciphers", 
      "stream cipher Trivium", 
      "key-recovery attack", 
      "automatic tool", 
      "differential cryptanalysis", 
      "practical key-recovery attacks", 
      "block cipher", 
      "Asiacrypt 2010", 
      "new cryptanalytic results", 
      "related-key scenario", 
      "cryptanalytic results", 
      "rounds of KATAN32", 
      "cipher", 
      "cryptanalysis", 
      "weak keys", 
      "conditional differential cryptanalysis", 
      "Trivium", 
      "cryptosystem", 
      "security", 
      "NLFSR", 
      "KATAN", 
      "attacks", 
      "scenarios", 
      "key", 
      "tool", 
      "technique", 
      "concept", 
      "rounds", 
      "reduced variants", 
      "KATAN48", 
      "class", 
      "KATAN64", 
      "improvement", 
      "KATAN32", 
      "results", 
      "variants", 
      "conditions", 
      "family", 
      "cipher Trivium"
    ], 
    "name": "Conditional Differential Cryptanalysis of Trivium and KATAN", 
    "pagination": "200-212", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020197941"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-28496-0_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-28496-0_12", 
      "https://app.dimensions.ai/details/publication/pub.1020197941"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:18", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_313.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-28496-0_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_12'


 

This table displays all metadata directly associated to this object as RDF triples.

119 TRIPLES      23 PREDICATES      66 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-28496-0_12 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nc7db7152b3d04165bcc5823bc9144a89
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description The concept of conditional differential cryptanalysis has been applied to NLFSR-based cryptosystems at ASIACRYPT 2010. We improve the technique by using automatic tools to find and analyze the involved conditions. Using these improvements we cryptanalyze the stream cipher Trivium and the KATAN family of lightweight block ciphers. For both ciphers we obtain new cryptanalytic results. For reduced variants of Trivium we obtain a class of weak keys that can be practically distinguished up to 961 of 1152 rounds. For the KATAN family we focus on its security in the related-key scenario and obtain practical key-recovery attacks for 120, 103 and 90 of 254 rounds of KATAN32, KATAN48 and KATAN64, respectively.
7 schema:editor N69dbed1947b248718c2d83d389a7adfe
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N40640999de1f400fbf8d12d60c8838c3
12 schema:keywords Asiacrypt 2010
13 KATAN
14 KATAN family
15 KATAN32
16 KATAN48
17 KATAN64
18 NLFSR
19 Trivium
20 attacks
21 automatic tool
22 block cipher
23 cipher
24 cipher Trivium
25 class
26 concept
27 conditional differential cryptanalysis
28 conditions
29 cryptanalysis
30 cryptanalytic results
31 cryptosystem
32 differential cryptanalysis
33 family
34 improvement
35 key
36 key-recovery attack
37 lightweight block ciphers
38 new cryptanalytic results
39 practical key-recovery attacks
40 reduced variants
41 related-key scenario
42 results
43 rounds
44 rounds of KATAN32
45 scenarios
46 security
47 stream cipher Trivium
48 technique
49 tool
50 variants
51 weak keys
52 schema:name Conditional Differential Cryptanalysis of Trivium and KATAN
53 schema:pagination 200-212
54 schema:productId N30f401dc080e449dbf6f7bbf0fe552e9
55 N4b61bef7e0a84ca5a550bd1d6d3a419b
56 schema:publisher N3850dcc00af24375864dee50dd83a770
57 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020197941
58 https://doi.org/10.1007/978-3-642-28496-0_12
59 schema:sdDatePublished 2022-01-01T19:18
60 schema:sdLicense https://scigraph.springernature.com/explorer/license/
61 schema:sdPublisher N63d23e469363479a948551910c6a8c31
62 schema:url https://doi.org/10.1007/978-3-642-28496-0_12
63 sgo:license sg:explorer/license/
64 sgo:sdDataset chapters
65 rdf:type schema:Chapter
66 N30f401dc080e449dbf6f7bbf0fe552e9 schema:name doi
67 schema:value 10.1007/978-3-642-28496-0_12
68 rdf:type schema:PropertyValue
69 N3850dcc00af24375864dee50dd83a770 schema:name Springer Nature
70 rdf:type schema:Organisation
71 N40640999de1f400fbf8d12d60c8838c3 schema:isbn 978-3-642-28495-3
72 978-3-642-28496-0
73 schema:name Selected Areas in Cryptography
74 rdf:type schema:Book
75 N4b61bef7e0a84ca5a550bd1d6d3a419b schema:name dimensions_id
76 schema:value pub.1020197941
77 rdf:type schema:PropertyValue
78 N58497a84d36846e886decffa031b520b rdf:first sg:person.013206304341.94
79 rdf:rest rdf:nil
80 N63d23e469363479a948551910c6a8c31 schema:name Springer Nature - SN SciGraph project
81 rdf:type schema:Organization
82 N69dbed1947b248718c2d83d389a7adfe rdf:first Nf2ca066fa368471b8d566682fb837017
83 rdf:rest N85e067e6e39a48e18039d75031088fea
84 N6d01b47409fd45ccb01147d0204503ea schema:familyName Vaudenay
85 schema:givenName Serge
86 rdf:type schema:Person
87 N85e067e6e39a48e18039d75031088fea rdf:first N6d01b47409fd45ccb01147d0204503ea
88 rdf:rest rdf:nil
89 Nc7db7152b3d04165bcc5823bc9144a89 rdf:first sg:person.016510524306.72
90 rdf:rest Nfb82909601634d33b5e9e42fa4818077
91 Nf2ca066fa368471b8d566682fb837017 schema:familyName Miri
92 schema:givenName Ali
93 rdf:type schema:Person
94 Nfb82909601634d33b5e9e42fa4818077 rdf:first sg:person.07653531142.18
95 rdf:rest N58497a84d36846e886decffa031b520b
96 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
97 schema:name Information and Computing Sciences
98 rdf:type schema:DefinedTerm
99 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
100 schema:name Computation Theory and Mathematics
101 rdf:type schema:DefinedTerm
102 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.410380.e
103 schema:familyName Naya-Plasencia
104 schema:givenName María
105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
106 rdf:type schema:Person
107 sg:person.016510524306.72 schema:affiliation grid-institutes:grid.410380.e
108 schema:familyName Knellwolf
109 schema:givenName Simon
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016510524306.72
111 rdf:type schema:Person
112 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
113 schema:familyName Meier
114 schema:givenName Willi
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
116 rdf:type schema:Person
117 grid-institutes:grid.410380.e schema:alternateName FHNW, Switzerland
118 schema:name FHNW, Switzerland
119 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...