Publicou 12 edições por ano
ISSN Imprimir: 0040-2508
ISSN On-line: 1943-6009
Indexed in
STUDYING OF k-DIMENSIONALITY OF THE LILI-128 CIPHER BOOLEAN FUNCTION
RESUMO
The paper presents results of the experimental study of the k-dimensionality of the LILI-128 cipher Boolean function, which demonstrated the potential for the execution of a statistical attack based on near-proximity of the Boolean functions with algebraically degenerate functions.
-
Dinur, I. and Shamir, A., (2009) , Cube attacks on tweakable black box polynomials, Advances in Cryptology. – EUROCRYPT’09, Proceedings, Springer-Verlag, pp. 278-299.
-
Fischer, S., Khazaei, S., and Meier, W., (2008) , Chosen IV statistical analysis for key recovery attacks on stream ciphers, AFRICACRYPT 2008, Proceedings, Springer-Verlag, pp. 236-245.
-
Aumasson, J.-Ph., Dinur, I., Hensen, L., Meier, W. et al., (2009) , Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128, Cryptology ePrint Archive, URL: http://eprint.iacr.org/2009/218 (last access: 29.10.18).
-
Aumasson, J.-Ph., Dinur, I., Meier, W., and Shamir, A., (2009) , Cube testers and key recovery attacks on reduced-round MD6 and Trivium, Fast Software Encryption – FSE’09, Proceedings, Springer- Verlag, pp. 1-22.
-
Aumasson, J.-Ph., Fischer, S., Khazaei, S., Meier, W. et al., (2008) , New features of Latin dances: analysis of Salsa, Cha-cha, and Rumba, Fast Software Encryption – FSE’08, Proceedings, Springer- Verlag, pp. 470-488.
-
Dinur, I., Gueysu, T., Paar, C., Shamir, A. et al., (2011) , An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware, Cryptology ePrint Archive, URL: http://eprint.iacr.org/2011/282 (last access: 29.10.18).
-
Dinur, I. and Shamir, A., (2011) , Breaking Grain-128 with dynamic cube attacks, Fast Software Encryption – FSE’11, Proceedings, Springer-Verlag, pp. 167-187.
-
Faisal, Sh., Resa, M., Susilo, W., and Seberry, J., (2011) , Extended cubes: enhancing cube attacks by low-degree non-linear equations, Proc. of the 6-th ACM Symp. on Information, Comput. and Communication Security (AIACCS’11), pp. 296-305.
-
Alekseychuk, А.N., Konushok, S.N., and Storozhuk, А.Yu., (2015) , Generalized statistical attack against synchronous stream ciphers, Information Security, 17(3), pp. 54-65, (in Ukrainian).
-
Alekseychuk, А.N., Konushok, S.N., and Storozhuk, А.Yu., (2014) , Statistical attack on gamma generator with linear law re-initialization of the initial state and complicating function close to the algebraically degenerate one, Radiotekhnika, 176, pp. 13-21, (in Russian).
-
Alekseychuk, А.N. and Konushok, S.N., (2014) , Algebraically degenerate approximations of Boolean functions, Cybernetics and System Analysis, 50(6), pp. 3-14, (in Russian).
-
Oleksiychuk, А.М., Konushok, S.М., and Storozhuk, А.Yu., (2015) , Fast algorithms for constructing k-dimensional approximations for Boolean functions, Information Security, 17(1), pp. 43-52, (in Ukrainian).
-
Alekseychuk, А.N. and Konushok, S.N., (2013) , An improved k-dimensionality test for Boolean functions, Cybernetics and System Analysis, 49(2), pp. 27-35, (in Russian).
-
Lechner, R.L., (1971) , Harmonic analysis of switching functions, Recent Developments in Switching Theory, New-York. Academic Press, pp. 122-228.
-
Dawson, E. and Wu, C.K., (1997) , Construction of correlation immune Boolean functions, Information and Communication Security, Proceedings. Berlin, Springer-Verlag, pp. 170-180.
-
Alekseev, Е.K., (2011) , On some measures of nonlinearity for Boolean functions, Applied Discrete Mathematics, 2(12), pp. 5-16, (in Russian).
-
Gopalan, P., O’Donnell, R., Servedio, A., Shpilka, A. et al., (2011) , Testing Fourier dimensionality and sparsity, SIAM J. on Computing, 40(4), pp. 1075-1100.
-
Golic, J. and Morgari, G., (2003) , On the resynchronization attack, Fast Software Encryption. – FSE’03, Proceedings, Springer-Verlag, pp. 100-110.
-
Alekseev, Е.К., (2010) , On attack against filtering generator with the complication function close to the algebraically degenerate one, Proc. of the Sixth Intern. Sci. Conf. on the Problems of Security and Combating Terrorism, Moscow, Russia, pp. 114-122.
-
Logachev, О.А., Salnikov, А.А., and Yashchenko, V.V., (2004) , Boolean Functions in Coding Theory and Cryptology, Moscow, Russia: MCCМE, 470 p., (in Russian).
-
Simpson, L.R., Dawson, E., Golić, J.D., and Millan, W.L., (2000) , LILI Keystream Generator, Selected Areas in Cryptography, – SAC 2000, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2012, pp. 248-261.
-
NESSIE New European Schemes for Signatures, Integrity, and Encryption, URL: https://www.cosic.esat.kuleuven.be/nessie/ (last access: 29.10.18).