2020
DOI: 10.1007/s10623-020-00756-5
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Gilbert’s known-key distinguisher

Abstract: Known-key distinguishers have been introduced by Knudsen and Rijmen in 2007 to better understand the security of block ciphers in situations where the key can not be considered to be secret, i.e. the "thing between secret-key model and hash function use-cases". Trying to find a rigorous model to fit this intuition is still ongoing. The most recent advance by Gilbert (Asiacrypt 2014) describes a new model that-even if it is well justified-seemingly does not match this intuition. AES is often considered as a tar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Therefore, one compatible di erential characteristic is found in roughly 2 31 time, which leads to 2 31 solutions for the active bytes of px 3 , x 4 , x 5 q. Moreover, since we can randomly assign k 5 r12s (Step 3 (b)), we totally have about 2 31`8 " 2 39 starting points, which is lower than the final time 2 56 . Briefly speaking, for a given p x 3 , y 3 q, p x 4 , y 4 q, p x 5 , y 5 q and k 5 r12s, we find one starting point with time complexity of 1 on average.…”
Section: 41b1 Remarkmentioning
confidence: 97%
See 2 more Smart Citations
“…Therefore, one compatible di erential characteristic is found in roughly 2 31 time, which leads to 2 31 solutions for the active bytes of px 3 , x 4 , x 5 q. Moreover, since we can randomly assign k 5 r12s (Step 3 (b)), we totally have about 2 31`8 " 2 39 starting points, which is lower than the final time 2 56 . Briefly speaking, for a given p x 3 , y 3 q, p x 4 , y 4 q, p x 5 , y 5 q and k 5 r12s, we find one starting point with time complexity of 1 on average.…”
Section: 41b1 Remarkmentioning
confidence: 97%
“…For a hash function, the three basic secure properties should be ensured, i.e., the resistance of collision attacks, preimage attacks, and second preimage attacks. For AES, the known-key attacks already reach full round AES-128 [32,54,56] by expoiting statistical non-random properties, which can also be extended into known-key distinguishers on Kiasu-BC. However, those non-random properties on block ciphers can hardly threat the three basic secure properties of corresponding hash functions.…”
Section: List Of Workmentioning
confidence: 99%
See 1 more Smart Citation