2021
DOI: 10.1007/978-3-030-92062-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Strong and Tight Security Guarantees Against Integral Distinguishers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…By counting monomial trails, they could ascertain whether a monomial from the plaintext or initialization vector (IV) appears in the cipher output polynomial. It was subsequently demonstrated that monomial prediction and the 3SDPwoU are equivalent in their application [20][21][22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By counting monomial trails, they could ascertain whether a monomial from the plaintext or initialization vector (IV) appears in the cipher output polynomial. It was subsequently demonstrated that monomial prediction and the 3SDPwoU are equivalent in their application [20][21][22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…For instance, in the case of the 20th round, it is necessary to conjecture the following set of register values: 1,3,4,5,7,8,9,11,12,13,15,16,17,18,19,20,21,22,23,24,25,27,28,29 [16], reg 16 [17], reg 16 [18], reg 16 [19]) ⊕ reg 19 [2] reg 20 [6] = S(reg 16 [16], reg 16 [17], reg 16 [18], reg 16 [19]) ⊕ reg 19 [6] reg 20 [10] = S(reg 16 [16], reg 16 [17], reg 16 [18], reg 16 [19]) ⊕ reg 19 [10] reg 20 [14] = S(reg 16 [16], reg 16 [17], reg 16 [18], reg 16 [19]) ⊕ reg 19 [4] reg 20 [26] = S(reg 16…”
Section: Data Preparationmentioning
confidence: 99%
“…Proposition 25 [35] Let E : F n 2 × F κ 2 → F n 2 be a block cipher and I(E) be a corresponding integral-resistance matrix. If I(E) has rank n 2 and k 0 is an independent whitening key, E k (x + k 0 ) fulfills the integral-resistance property.…”
Section: Security Argumentsmentioning
confidence: 99%
“…Since the width of the datapath is so small, we are able to directly evaluate certain input sets. Hence, with the help of [HLLT20,HLLT21], we are able to show that all monomials of degree 23 are present in each linear combination of the output bits after a certain number of rounds. Moreover, we can show that sums of any selection of output bits are key dependent for any selection of input sets that are non-empty and not the full set.…”
Section: Algebraic Degree Of the Datapathmentioning
confidence: 99%
“…It is possible to pick any set and evaluate it. In [HLLT21], strong arguments against integral distinguishers are given. In essence, in the first step, for each output bit, one has to show that the superpolys associated with each high-degree term are linearly independent.…”
Section: Algebraic Degree Of the Datapathmentioning
confidence: 99%