UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Vesselin Velichkov , Nicky Mouha , Christophe De Cannière , Bart Preneel

ABSTRACT

Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences. More... »

PAGES

287-305

Book

TITLE

Fast Software Encryption

ISBN

978-3-642-34046-8
978-3-642-34047-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17

DOI

http://dx.doi.org/10.1007/978-3-642-34047-5_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1005516559


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Velichkov", 
        "givenName": "Vesselin", 
        "id": "sg:person.016053537207.98", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016053537207.98"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mouha", 
        "givenName": "Nicky", 
        "id": "sg:person.014546777621.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014546777621.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "De Canni\u00e8re", 
        "givenName": "Christophe", 
        "id": "sg:person.010724202423.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010724202423.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences.", 
    "editor": [
      {
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-34047-5_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-34046-8", 
        "978-3-642-34047-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "cryptographic primitives", 
      "stream cipher Salsa20", 
      "best differential trails", 
      "addition modulo 2n", 
      "automatic search", 
      "key recovery attack", 
      "faster performance", 
      "primitives", 
      "modulo 2n", 
      "differential cryptanalysis", 
      "special set", 
      "bit rotation", 
      "differential trails", 
      "Salsa20", 
      "cipher", 
      "set", 
      "cryptanalysis", 
      "new tool", 
      "software", 
      "algorithm", 
      "XOR", 
      "attacks", 
      "multiple rounds", 
      "search", 
      "tool", 
      "applications", 
      "performance", 
      "differential analysis", 
      "rounds", 
      "ARX", 
      "probability", 
      "number", 
      "trails", 
      "additive difference", 
      "analysis", 
      "rotation", 
      "differences", 
      "differential", 
      "resistance", 
      "paper"
    ], 
    "name": "UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX", 
    "pagination": "287-305", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1005516559"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-34047-5_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-34047-5_17", 
      "https://app.dimensions.ai/details/publication/pub.1005516559"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_1.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-34047-5_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'


 

This table displays all metadata directly associated to this object as RDF triples.

121 TRIPLES      22 PREDICATES      65 URIs      58 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-34047-5_17 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N4dfc9c1752c047a2ac8153765581f73f
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences.
7 schema:editor Na98743e90bb140468bc4b8405c477e85
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N18021c5028d04c1781a5495a310445cd
11 schema:keywords ARX
12 Salsa20
13 XOR
14 addition modulo 2n
15 additive difference
16 algorithm
17 analysis
18 applications
19 attacks
20 automatic search
21 best differential trails
22 bit rotation
23 cipher
24 cryptanalysis
25 cryptographic primitives
26 differences
27 differential
28 differential analysis
29 differential cryptanalysis
30 differential trails
31 faster performance
32 key recovery attack
33 modulo 2n
34 multiple rounds
35 new tool
36 number
37 paper
38 performance
39 primitives
40 probability
41 resistance
42 rotation
43 rounds
44 search
45 set
46 software
47 special set
48 stream cipher Salsa20
49 tool
50 trails
51 schema:name UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
52 schema:pagination 287-305
53 schema:productId Na2a048501a004d0daecb4ab4d0996b03
54 Nf7bb331b28bd42e1b7940910136f2d99
55 schema:publisher Nc61f6d5532794befba2ed8ce3dd6f09f
56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005516559
57 https://doi.org/10.1007/978-3-642-34047-5_17
58 schema:sdDatePublished 2022-12-01T06:46
59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
60 schema:sdPublisher N4561deee8e644e5dab638ecee55db022
61 schema:url https://doi.org/10.1007/978-3-642-34047-5_17
62 sgo:license sg:explorer/license/
63 sgo:sdDataset chapters
64 rdf:type schema:Chapter
65 N18021c5028d04c1781a5495a310445cd schema:isbn 978-3-642-34046-8
66 978-3-642-34047-5
67 schema:name Fast Software Encryption
68 rdf:type schema:Book
69 N4561deee8e644e5dab638ecee55db022 schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 N4dfc9c1752c047a2ac8153765581f73f rdf:first sg:person.016053537207.98
72 rdf:rest Nee28bbb9b0714ee78baba2979ec0fe60
73 Na2a048501a004d0daecb4ab4d0996b03 schema:name doi
74 schema:value 10.1007/978-3-642-34047-5_17
75 rdf:type schema:PropertyValue
76 Na90cafd07e4d47589482e035e64a9aba rdf:first sg:person.010724202423.53
77 rdf:rest Nde72b440df7c40fea1ffdd0aa0c0955f
78 Na98743e90bb140468bc4b8405c477e85 rdf:first Nc50aa8e282794554b3d5786f2909a9f7
79 rdf:rest rdf:nil
80 Nc50aa8e282794554b3d5786f2909a9f7 schema:familyName Canteaut
81 schema:givenName Anne
82 rdf:type schema:Person
83 Nc61f6d5532794befba2ed8ce3dd6f09f schema:name Springer Nature
84 rdf:type schema:Organisation
85 Nde72b440df7c40fea1ffdd0aa0c0955f rdf:first sg:person.011115044357.39
86 rdf:rest rdf:nil
87 Nee28bbb9b0714ee78baba2979ec0fe60 rdf:first sg:person.014546777621.78
88 rdf:rest Na90cafd07e4d47589482e035e64a9aba
89 Nf7bb331b28bd42e1b7940910136f2d99 schema:name dimensions_id
90 schema:value pub.1005516559
91 rdf:type schema:PropertyValue
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
96 schema:name Computer Software
97 rdf:type schema:DefinedTerm
98 sg:person.010724202423.53 schema:affiliation grid-institutes:grid.56912.39
99 schema:familyName De Cannière
100 schema:givenName Christophe
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010724202423.53
102 rdf:type schema:Person
103 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
104 schema:familyName Preneel
105 schema:givenName Bart
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
107 rdf:type schema:Person
108 sg:person.014546777621.78 schema:affiliation grid-institutes:grid.56912.39
109 schema:familyName Mouha
110 schema:givenName Nicky
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014546777621.78
112 rdf:type schema:Person
113 sg:person.016053537207.98 schema:affiliation grid-institutes:grid.56912.39
114 schema:familyName Velichkov
115 schema:givenName Vesselin
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016053537207.98
117 rdf:type schema:Person
118 grid-institutes:grid.56912.39 schema:alternateName Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
119 schema:name Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001, Heverlee, Belgium
120 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
121 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...