| 000 | 12359cam a22005057i 4500 | ||
|---|---|---|---|
| 999 |
_c94207 _d94207 |
||
| 001 | 14168033 | ||
| 005 | 20260210090532.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 260210t20232023enk ob 001 0 eng d | ||
| 020 | _a9781789451474 | ||
| 020 |
_a9781394256327 _qelectronic book |
||
| 020 |
_a1394256329 _qelectronic book |
||
| 020 |
_a9781394256303 _qelectronic book |
||
| 020 |
_a1394256302 _qelectronic book |
||
| 020 |
_z9781789451474 _qhardcover |
||
| 035 | _a(OCoLC)1415903846 | ||
| 035 | 9 | _a(OCLCCM-Owned)1415903846 | |
| 040 |
_aSFB _beng _erda _epn _cSFB _dOCLCO _dDG1 _dOCLCF _dYDX _dOCLCL _dSFB |
||
| 041 | _aeng. | ||
| 049 | _aMAIN | ||
| 050 | 4 |
_aZ104 _b.S966 2023 |
|
| 082 | 0 | 0 |
_223 _a652.8 |
| 245 | 0 | 0 |
_aSymmetric cryptography _nVolume 2 : _bCryptanalysis and future directions / _ccoordinated by Christina Boura, María Naya-Plasencia. |
| 250 | _aFirst edition. | ||
| 264 | 1 |
_aLondon, UK : _bISTE Ltd ; _aHoboken, NJ : _bJohn Wiley & Sons, Inc., _c2023. |
|
| 264 | 4 | _c©2023 | |
| 300 | _a1 online resource (265 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 0 | _aComputer science. Cryptography, data security | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aTable of Contents Preface xiii Christina Boura and María Naya-Plasencia Part 1 Cryptanalysis of Symmetric-key Algorithms 1 Chapter 1 Differential Cryptanalysis 3 Henri Gilbert and Jérémy Jean 1.1. Statistical attacks on block ciphers: preliminaries 4 1.2. Principle of differential cryptanalysis and application to DES 7 1.2.1. Differential transitions and differential characteristics 7 1.2.2. Derivation of non-trivial differential characteristics 10 1.2.3. Leveraging characteristics to mount a key-recovery attack 14 1.3. Some refinements and generalizations 18 1.3.1. Differential effect 18 1.3.2. Truncated differentials 19 1.4. Design strategies and evaluation 20 1.4.1 Case of the AES 21 1.4.2. Automated analysis 23 1.5. Further notes and references 23 1.6. References 26 Chapter 2 Linear Cryptanalysis 29 Kaisa Nyberg and Antonio Flórez-Gutiérrez 2.1. History 29 2.2. Correlation and linear hull 30 2.3. Multidimensional linear approximation 31 2.4. Walsh-Hadamard transform 32 2.5. Linear approximation of an iterative block cipher 32 2.6. Matsui’s Algorithm 1 type of key recovery 33 2.7. Matsui’s Algorithm 2 type of key recovery 34 2.8. Searching for linear approximations and estimating correlations 35 2.9. Speeding up key recovery 36 2.10. Key-recovery distinguisher 38 2.11. Classical model of Algorithm 2 39 2.12. Algorithm 2 with distinct known plaintext and randomized key 40 2.13. Multiple linear approximations 40 2.14. Multidimensional linear cryptanalysis 42 2.15. References 43 Chapter 3 Impossible Differential Cryptanalysis 47 Christina Boura and María Naya-Plasencia 3.1. Finding impossible differentials 48 3.2. Key recovery 49 3.2.1. Data, time and memory complexities 50 3.3. Some improvements 52 3.3.1. Early abort technique 52 3.3.2. Multiple impossible differentials or multiple extension paths 53 3.4. Applications 54 3.5. References 54 Chapter 4 Zero-Correlation Cryptanalysis 57 Vincent Rijmen 4.1. Correlation and linear cryptanalysis 57 4.1.1. Correlation matrix 57 4.1.2. Linear trails and linear hulls 58 4.1.3. Approximations of linear functions 59 4.1.4. Computing the correlations over a permutation 60 4.2. Attacks using a linear hull with correlation zero 60 4.2.1. Correlation zero in random permutations 61 4.2.2. Distinguisher 61 4.2.3. Reducing the data complexity 62 4.3. Linear hulls with correlation zero 62 4.3.1. Feistel ciphers 63 4.3.2. AES 64 4.3.3 Extended result on AES 64 4.4. References 64 Chapter 5 Differential-Linear Cryptanalysis 67 Yosuke Todo 5.1. Brief introduction of differential-linear attacks 67 5.2. How to estimate correlations of a differential-linear distinguisher 69 5.3. On the key recovery 71 5.4. State of the art for differential-linear attacks 72 5.4.1. Differential-linear connecting table 72 5.4.2. Three techniques to improve differential-linear attacks 73 5.5. References 76 Chapter 6 Boomerang Cryptanalysis 77 Ling Song 6.1. Basic boomerang attack 77 6.2. Variants and refinements 79 6.3. Tricks and failures 80 6.4. Formalize the dependency 83 6.5. References 86 Chapter 7 Meet-in-the-Middle Cryptanalysis 89 Brice Minaud 7.1. Introduction 89 7.2. Basic meet-in-the-middle framework 90 7.2.1. The 2DES attack 90 7.2.2. Algorithmic framework 91 7.2.3. Complexity analysis and memory usage 92 7.3. Meet-in-the-middle techniques 94 7.3.1. Filtering 94 7.3.2. Splice-and-cut 96 7.3.3. Bicliques 97 7.4. Automatic tools 98 7.5. References 98 Chapter 8 Meet-in-the-Middle Demirci-Selçuk Cryptanalysis 101 Patrick Derbez 8.1. Original Demirci-Selçuk attack 101 8.2. Improvements 103 8.2.1. Data/time/memory trade-off 104 8.2.2. Difference instead of value 104 8.2.3. Multiset 105 8.2.4. Linear combinations 105 8.2.5. Differential enumeration technique 106 8.3. Finding the best attacks 108 8.3.1. Tools 108 8.3.2. Results 109 8.4. References 109 Chapter 9 Invariant Cryptanalysis 111 Christof Beierle 9.1. Introduction 111 9.2. Invariants for permutations and block ciphers 112 9.2.1. Invariant subspaces 113 9.2.2. Quadratic invariants 117 9.3. On design criteria to prevent attacks based on invariants 117 9.4. A link to linear approximations 119 9.5. References 121 Chapter 10 Higher Order Differentials, Integral Attacks and Variants 123 Anne Canteaut 10.1. Integrals and higher order derivatives 123 10.2. Algebraic degree of an iterated function 126 10.3. Division property 128 10.4. Attacks based on integrals 130 10.4.1. Distinguishers 130 10.4.2. Attacks 130 10.5. References 131 Chapter 11 Cube Attacks and Distinguishers 133 Itai Dinur 11.1. Cube attacks and cube testers 133 11.1.1. Terminology 134 11.1.2. Main observation 135 11.1.3. The basic cube attack 136 11.1.4. The preprocessing phase on cube attacks 137 11.1.5. Cube testers 138 11.1.6. Applications 139 11.2. Conditional differential attacks and dynamic cube attacks 140 11.2.1. Conditional differential attacks 140 11.2.2. Dynamic cube attacks 140 11.2.3. A toy example 140 11.3. References 141 Chapter 12 Correlation Attacks on Stream Ciphers 143 Thomas Johansson 12.1. Correlation attacks on the nonlinear combination generator 144 12.2. Correlation attacks and decoding linear codes 145 12.3. Fast correlation attacks 146 12.3.1. Fast correlation attacks and low weight feedback polynomials 147 12.3.2. Finding low weight multiples of the feedback polynomial 148 12.3.3. Fast correlation attacks by reducing the code dimension 150 12.4. Generalizing fast correlation attacks 151 12.4.1. The E0 stream cipher 151 12.4.2. The A5/1 stream cipher 152 12.5. References 153 Chapter 13 Addition, Rotation, XOR 155 Léo Perrin 13.1. What is ARX? 155 13.1.1. Structure of an ARX-based primitive 156 13.1.2. Development of ARX 156 13.2. Understanding modular addition 157 13.2.1. Expressing modular addition in Fn2 158 13.2.2. Cryptographic properties of modular addition 158 13.3. Analyzing ARX-based primitives 160 13.3.1. Searching for differential and linear trails 160 13.3.2. Proving security against differential and linear attacks 161 13.3.3. Other cryptanalysis techniques 162 13.4. References 163 Chapter 14 SHA-3 Contest Related Cryptanalysis 167 Yu S Asaki 14.1. Chapter overview 167 14.2. Differences between attacks against keyed and keyless primitives 168 14.3. Rebound attack 169 14.3.1. Basic strategy of the rebound attack 169 14.3.2. Rebound attack against AES-like structures 171 14.4. Improving rebound attacks with Super-Sbox 173 14.5. References for further reading about rebound attacks 175 14.6. Brief introduction of other cryptanalysis 176 14.6.1. Internal differential cryptanalysis 176 14.6.2. Rotational cryptanalysis 177 14.7. References 177 Chapter 15 Cryptanalysis of SHA-1 181 Marc Stevens 15.1. Design of SHA-1 181 15.2. SHA-1 compression function 182 15.3. Differential analysis 184 15.4. Near-collision attacks 184 15.5. Near-collision search 185 15.6. Message expansion differences 186 15.7. Differential trail 187 15.8. Local collisions 187 15.9. Disturbance vector 188 15.10. Disturbance vector selection 189 15.11. Differential trail construction 190 15.12. Message modification techniques 190 15.13. Overview of published collision attacks 191 15.14. References 192 Part 2 Future Directions 195 Chapter 16 Lightweight Cryptography 197 Meltem Sönmez Turan 16.1. Lightweight cryptography standardization efforts 197 16.2. Desired features 198 16.3. Design approaches in lightweight cryptography 200 16.4. References 202 Chapter 17 Post-Quantum Symmetric Cryptography 203 María Naya-Plasencia 17.1. Different considered models 204 17.1.1. With respect to the queries 204 17.1.2. With respect to memory 205 17.2. On Simon’s and Q2 attacks 206 17.2.1. Off-line Simon’s attack 207 17.3. Quantizing classical attacks in Q 1 207 17.3.1. About collisions 207 17.4. On the design of quantum-safe primitives 208 17.5. Perspectives and conclusion 209 17.5.1. About losing the quantum and classical surname 209 17.5.2. No panic 209 17.6. References 209 Chapter 18 New Fields in Symmetric Cryptography 215 Léo Perrin 18.1. Arithmetization-oriented symmetric primitives (ZK proof systems) 216 18.1.1. The current understanding of this new language 217 18.1.2. The first attempts 218 18.1.3. Cryptanalysis 219 18.2. Symmetric ciphers for hybrid homomorphic encryption 220 18.2.1. The current understanding of this new language 221 18.2.2. First design strategies 221 18.3. Parting thoughts 223 18.4. References 223 Chapter 19 Deck-function-based Cryptography 227 Joan Daemen 19.1. Block-cipher centric cryptography 227 19.2. Permutation-based cryptography 227 19.3. The problem of the random permutation security model 228 19.4. Deck functions 228 19.5. Modes of deck functions and instances 229 19.6. References 230 List of Authors 231 Index 233 Summary of Volume 1 239 | |
| 520 | 8 | _aSymmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions. The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components and their most relevant constructions. Second, it describes and provides insights on the most popular cryptanalysis and proof techniques for analyzing the security of the above algorithms. A selected number of future directions, such as post-quantum security or design of ciphers for modern needs and particular applications, are also discussed. We believe that the two volumes of this work will be of interest to researchers, to master's and PhD students studying or working in the field of cryptography, as well as to all professionals working in the field of cybersecurity. | |
| 545 | 0 | _aAbout the Author Christina Boura is an associate professor at the University of Versailles, France, who works on symmetric cryptography. She is a well-recognized member of the cryptographic community, having served on many program committees and as editor-in-chief of the ToSC IACR journal. María Naya-Plasencia is a research director at Inria, France, who also works on symmetric cryptography. She obtained an ERC grant in 2016 and the Young Researcher Prize from Inria-Académie des Sciences in 2019, and has given several invited keynote talks. | |
| 588 | _aDescription based on online resource; title from digital title page (viewed on April 10, 2024). | ||
| 650 | 0 |
_aCryptography. _0http://id.loc.gov/authorities/subjects/sh85034453 |
|
| 650 | 6 | _aCryptographie. | |
| 655 | 4 | _aElectronic book. | |
| 700 | 1 |
_aBoura, Christina, _eeditor. |
|
| 700 | 1 |
_aNaya-Plasencia, Maria, _eeditor. |
|
| 856 | 4 | 0 |
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394256327 _yFull text is available at Wiley Online Library. Click here to view |
| 942 |
_2ddc _cER |
||