UNAF: A special set of additive differences with application to the differential analysis of ARX

6Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Due to their fast performance in software, an increasing number of cryptographic primitives are constructed using the operations addition modulo 2 n, bit rotation and XOR (ARX). However, the resistance of ARX-based ciphers against differential cryptanalysis is not well understood. In this paper, we propose a new tool for evaluating more accurately the probabilities of additive differentials over multiple rounds of a cryptographic primitive. First, we introduce a special set of additive differences, called UNAF (unsigned non-adjacent form) differences. Then, we show how to apply them to find good differential trails using an algorithm for the automatic search for differentials. Finally, we describe a key-recovery attack on stream cipher Salsa20 reduced to five rounds, based on UNAF differences. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Velichkov, V., Mouha, N., De Cannière, C., & Preneel, B. (2012). UNAF: A special set of additive differences with application to the differential analysis of ARX. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7549 LNCS, pp. 287–305). https://doi.org/10.1007/978-3-642-34047-5_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free