Sciweavers

IACR
2016

Automatic Expectation and Variance Computing for Attacks on Feistel Schemes

8 years 18 days ago
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
There are many kinds of attacks that can be mounted on block ciphers: differential attacks, impossible differential attacks, truncated differential attacks, boomerang attacks. We consider generic differential attacks used as distinguishers for various types of Feistel ciphers: they allow to distinguish a random permutation from a permutation generated by the cipher. These attacks are based on differences between the expectations of random variables defined by relations on the inputs and outputs of the ciphers. Sometimes, one has to use the value of the variance as well. In this paper, we will provide a tool that computes the exact values of these expectations and variances. We first explain thoroughly how these computations can be carried out by counting the number of solutions of a linear systems with equalities and non-equalities. Then we provide the first applications of this tool. For example, it enabled to discover a new geometry in 4-point attacks. It gave an explanation ...
Emmanuel Volte, Valérie Nachef, Nicolas Mar
Added 03 Apr 2016
Updated 03 Apr 2016
Type Journal
Year 2016
Where IACR
Authors Emmanuel Volte, Valérie Nachef, Nicolas Marrière
Comments (0)