UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Vesselin Velichkov , Nicky Mouha , Christophe De Cannière , Bart Preneel

ABSTRACT

Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences. More... »

PAGES

287-305

Book

TITLE

Fast Software Encryption

ISBN

978-3-642-34046-8
978-3-642-34047-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17

DOI

http://dx.doi.org/10.1007/978-3-642-34047-5_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1005516559


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Velichkov", 
        "givenName": "Vesselin", 
        "id": "sg:person.016053537207.98", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016053537207.98"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mouha", 
        "givenName": "Nicky", 
        "id": "sg:person.014546777621.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014546777621.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "De Canni\u00e8re", 
        "givenName": "Christophe", 
        "id": "sg:person.010724202423.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010724202423.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences.", 
    "editor": [
      {
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-34047-5_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-34046-8", 
        "978-3-642-34047-5"
      ], 
      "name": "Fast Software Encryption", 
      "type": "Book"
    }, 
    "keywords": [
      "cryptographic primitives", 
      "stream cipher Salsa20", 
      "best differential trails", 
      "addition modulo 2n", 
      "automatic search", 
      "key recovery attack", 
      "faster performance", 
      "primitives", 
      "modulo 2n", 
      "differential cryptanalysis", 
      "special set", 
      "bit rotation", 
      "differential trails", 
      "Salsa20", 
      "cipher", 
      "set", 
      "cryptanalysis", 
      "new tool", 
      "software", 
      "algorithm", 
      "XOR", 
      "attacks", 
      "multiple rounds", 
      "search", 
      "tool", 
      "applications", 
      "performance", 
      "differential analysis", 
      "rounds", 
      "ARX", 
      "probability", 
      "number", 
      "trails", 
      "additive difference", 
      "analysis", 
      "rotation", 
      "differences", 
      "differential", 
      "resistance", 
      "paper"
    ], 
    "name": "UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX", 
    "pagination": "287-305", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1005516559"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-34047-5_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-34047-5_17", 
      "https://app.dimensions.ai/details/publication/pub.1005516559"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_147.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-34047-5_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34047-5_17'


 

This table displays all metadata directly associated to this object as RDF triples.

121 TRIPLES      22 PREDICATES      65 URIs      58 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-34047-5_17 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N203a33122d7f47e2b11705501d775e84
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences.
7 schema:editor Na2aa871b55024db0a227d17722a7c3e3
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Ndd8025e1c9364ba5a23be082bb8c8970
11 schema:keywords ARX
12 Salsa20
13 XOR
14 addition modulo 2n
15 additive difference
16 algorithm
17 analysis
18 applications
19 attacks
20 automatic search
21 best differential trails
22 bit rotation
23 cipher
24 cryptanalysis
25 cryptographic primitives
26 differences
27 differential
28 differential analysis
29 differential cryptanalysis
30 differential trails
31 faster performance
32 key recovery attack
33 modulo 2n
34 multiple rounds
35 new tool
36 number
37 paper
38 performance
39 primitives
40 probability
41 resistance
42 rotation
43 rounds
44 search
45 set
46 software
47 special set
48 stream cipher Salsa20
49 tool
50 trails
51 schema:name UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX
52 schema:pagination 287-305
53 schema:productId N7be07db1ffbf4505b00ef94f3ad843ba
54 N7c6e883307804e48836cbea859e24e42
55 schema:publisher N44e75d1520f1465e84c9ae1d2c9d1790
56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005516559
57 https://doi.org/10.1007/978-3-642-34047-5_17
58 schema:sdDatePublished 2022-09-02T16:10
59 schema:sdLicense https://scigraph.springernature.com/explorer/license/
60 schema:sdPublisher Na1e910088f984a4c8506a406ec011ee9
61 schema:url https://doi.org/10.1007/978-3-642-34047-5_17
62 sgo:license sg:explorer/license/
63 sgo:sdDataset chapters
64 rdf:type schema:Chapter
65 N07a13a6d3fb0419a8b0a473f9359ab06 schema:familyName Canteaut
66 schema:givenName Anne
67 rdf:type schema:Person
68 N1bacc0fa0c97448fb478417e0644d040 rdf:first sg:person.010724202423.53
69 rdf:rest N3ea72b72874d4a61830fd1f45b96853f
70 N203a33122d7f47e2b11705501d775e84 rdf:first sg:person.016053537207.98
71 rdf:rest N36749649319d466db2fdde97cc0d8fa3
72 N36749649319d466db2fdde97cc0d8fa3 rdf:first sg:person.014546777621.78
73 rdf:rest N1bacc0fa0c97448fb478417e0644d040
74 N3ea72b72874d4a61830fd1f45b96853f rdf:first sg:person.011115044357.39
75 rdf:rest rdf:nil
76 N44e75d1520f1465e84c9ae1d2c9d1790 schema:name Springer Nature
77 rdf:type schema:Organisation
78 N7be07db1ffbf4505b00ef94f3ad843ba schema:name dimensions_id
79 schema:value pub.1005516559
80 rdf:type schema:PropertyValue
81 N7c6e883307804e48836cbea859e24e42 schema:name doi
82 schema:value 10.1007/978-3-642-34047-5_17
83 rdf:type schema:PropertyValue
84 Na1e910088f984a4c8506a406ec011ee9 schema:name Springer Nature - SN SciGraph project
85 rdf:type schema:Organization
86 Na2aa871b55024db0a227d17722a7c3e3 rdf:first N07a13a6d3fb0419a8b0a473f9359ab06
87 rdf:rest rdf:nil
88 Ndd8025e1c9364ba5a23be082bb8c8970 schema:isbn 978-3-642-34046-8
89 978-3-642-34047-5
90 schema:name Fast Software Encryption
91 rdf:type schema:Book
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
96 schema:name Computer Software
97 rdf:type schema:DefinedTerm
98 sg:person.010724202423.53 schema:affiliation grid-institutes:grid.56912.39
99 schema:familyName De Cannière
100 schema:givenName Christophe
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010724202423.53
102 rdf:type schema:Person
103 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
104 schema:familyName Preneel
105 schema:givenName Bart
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
107 rdf:type schema:Person
108 sg:person.014546777621.78 schema:affiliation grid-institutes:grid.56912.39
109 schema:familyName Mouha
110 schema:givenName Nicky
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014546777621.78
112 rdf:type schema:Person
113 sg:person.016053537207.98 schema:affiliation grid-institutes:grid.56912.39
114 schema:familyName Velichkov
115 schema:givenName Vesselin
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016053537207.98
117 rdf:type schema:Person
118 grid-institutes:grid.56912.39 schema:alternateName Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
119 schema:name Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001, Heverlee, Belgium
120 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
121 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...