2002
DOI: 10.1007/3-540-45473-x_28
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Algorithms for Computing Differential Properties of Addition

Abstract: In this paper we systematically study the differential properties of addition modulo 2 n. We derive Θ(log n)-time algorithms for most of the properties, including differential probability of addition. We also present log-time algorithms for finding good differentials. Despite the apparent simplicity of modular addition, the best known algorithms require naive exhaustive computation. Our results represent a significant improvement over them. In the most extreme case, we present a complexity reduction from Ω(2 4… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
126
0
3

Year Published

2005
2005
2010
2010

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(131 citation statements)
references
References 5 publications
2
126
0
3
Order By: Relevance
“…In this way, we can recover 192 last subkey bits one by one. We will recover the least significant 10 bits of k 9,0 , k 9,1 and k 9,6 ; the least significant 35 bits of k 9,3 and k 9,4 ; the least significant 31 bits of k 9,2 ; the least significant 39 bits of k 9,5 ; and the least significant 22 bits of k 9,7 .…”
Section: Related-key Boomerang Key Recovery Attack On 33-round Threefmentioning
confidence: 99%
See 3 more Smart Citations
“…In this way, we can recover 192 last subkey bits one by one. We will recover the least significant 10 bits of k 9,0 , k 9,1 and k 9,6 ; the least significant 35 bits of k 9,3 and k 9,4 ; the least significant 31 bits of k 9,2 ; the least significant 39 bits of k 9,5 ; and the least significant 22 bits of k 9,7 .…”
Section: Related-key Boomerang Key Recovery Attack On 33-round Threefmentioning
confidence: 99%
“…We will depict how to recover the least significant 10 bits of k 9,6 as an example to illustrate the method. We make use of two of the bit conditions in v 33,6 , i.e.…”
Section: Related-key Boomerang Key Recovery Attack On 33-round Threefmentioning
confidence: 99%
See 2 more Smart Citations
“…3. The last condition, (6), is of the same form as the first condition, so it can be solved in exactly the same way. The expected probability that a solution exists is again 2 −19.5 .…”
Section: The First Phase Of the Attackmentioning
confidence: 99%