Computational Science — ICCS 2002

  • Hernández J
  • Sierra J
  • Isasi P
  • et al.
N/ACitations
Citations of this article
41Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Distinguishing the output of a cryptographic primitive such as a block cipher or a hash function from the output of a random mapping seriously affects the credibility of the primitive security, and defeats it for many cryptographic applications. However, this is usually a quite difficult task. In a previous work [ 1 ], a new cryptoanalytic technique was presented and proved useful in distinguishing a block cipher from a random permutation in a completely automatic way. This technique is based in the selection of the worst input patterns for the block cipher with the aid of genetic algorithms. The objective is to find which input patters generate a significant deviation of the observed output from the output we would expect from a random permutation. In [ 1 ], this technique was applied to the case of the block cipher TEA with 1 round. The much harder problem of breaking TEA with 2 rounds is successfully solved in this paper, where an efficient distinguisher is also presented.

Cite

CITATION STYLE

APA

Hernández, J., Sierra, J., Isasi, P., Ribagorda, A., Sloot, P., Hoekstra, A., … Dongarra, J. (2002). Computational Science — ICCS 2002. (P. M. A. Sloot, A. G. Hoekstra, C. J. K. Tan, & J. J. Dongarra, Eds.) (Vol. 2331, pp. 1024–1031). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-47789-6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free