2010
DOI: 10.1090/conm/518/10196
|View full text |Cite
|
Sign up to set email alerts
|

Structural weaknesses of permutations with a low differential uniformity and generalized crooked functions

Abstract: Abstract. Any permutation with a low differential uniformity is shown to be such that its inverse has a derivative with a large image set. An attack exploiting this structural property is then presented against a recent hash function proposal, named Maraca, submitted to the SHA-3 competition. Moreover, the attack can be made much more efficient when the image sets of the derivatives of the inverse permutation are affine subspaces. This cryptanalytic approach leads to some generalizations of the notion of crook… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…As noticed in [98], F is differentially Δ F -uniform with two-valued differential spectrum if and only if ∇ F · Δ F = 2 n holds.…”
Section: Exploiting the Apn Property Of The S-boxes In Cryptanalysismentioning
confidence: 92%
See 3 more Smart Citations
“…As noticed in [98], F is differentially Δ F -uniform with two-valued differential spectrum if and only if ∇ F · Δ F = 2 n holds.…”
Section: Exploiting the Apn Property Of The S-boxes In Cryptanalysismentioning
confidence: 92%
“…In [98], Anne Canteaut and Marìa Naya-Plasencia present an attack on the hash function MARACA proposed to the SHA3 competition and show that the higher the number of input differences which can lead to the same output difference is, the better the attack works. The quantity describing the power of the attack is denoted by ∇ F and is defined as…”
Section: Exploiting the Apn Property Of The S-boxes In Cryptanalysismentioning
confidence: 99%
See 2 more Smart Citations
“…However, in practice, the function t often has a set of properties which can be exploited to optimize this approach. We aim at reducing the number of candidates which have to be examined, in some cases by a preliminary sieving similar to the one used in [5]. This paper presents such optimization techniques, that, when applied to most of the rebound attacks published on the SHA-3 candidates, yield significant improvements in the overall time and/or memory complexities of the attack, as shown on Table 1.…”
Section: Introductionmentioning
confidence: 99%