Analysis of Differential Attacks in ARX Constructions

  • Leurent G
N/ACitations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we study differential attacks against ARX schemes. We build upon the generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit constraints to describe differential characteristics in ARX designs more accurately, and quartet constraints to analyze boomerang attacks. We also describe how to propagate those constraints; this can be used either to assist manual construction of a differential characteristic, or to extract more information from an already built characteristic. We show that our new constraints are more precise than what was used in previous works, and can detect more cases of incompatibility. In particular, we show that several published attacks are in fact fact invalid because the differential characteristics cannot be satisfied. This highlights the importance of verifying differential attacks more thoroughly. © International Association for Cryptologic Research 2012.

Cite

CITATION STYLE

APA

Leurent, G. (2012). Analysis of Differential Attacks in ARX Constructions (pp. 226–243). https://doi.org/10.1007/978-3-642-34961-4_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free