Differential experiments using parallel alternative operations
Abstract: The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, are lately receiving increasing attention. Recently, Civino et al. managed to design a block cipher which is secure w.r.t. classical differential cryptanalysis performed using XOR-differentials, but weaker with respect to the attack based on an alternative difference operation acting on the first s-box of the block. We extend this result to parallel alternative operations, i.e. acting on each s-box of the block. First, we recall the mathematical framework needed to define and use such operations. After that, we perform some differential experiments against a toy cipher and compare the effectiveness of the attack w.r.t. the one that uses XOR-differentials.
- Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. Journal of CRYPTOLOGY. 1991;4:3–72.
- Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. Journal of Cryptology. 2005;18:291–311.
- Knudsen LR. Truncated and higher order differentials. In: Fast Software Encryption: Second International Workshop Leuven, Belgium, December 14–16, 1994 Proceedings 2. Springer; 1995. p. 196–211.
- Wagner D. The boomerang attack. In: International Workshop on Fast Software Encryption. Springer; 1999. p. 156–170.
- Nyberg K. Differentially uniform mappings for cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer; 1993. p. 55–64.
- Survey on recent trends towards generalized differential and boomerang uniformities. Cryptography and Communications. 2022;p. 1–45.
- Berson TA. Differential cryptanalysis mod 232superscript2322^{32}2 start_POSTSUPERSCRIPT 32 end_POSTSUPERSCRIPT with applications to MD5. In: Workshop on the Theory and Application of of Cryptographic Techniques. Springer; 1992. p. 71–80.
- Abazari F, Sadeghian B. Cryptanalysis with ternary difference: applied to block cipher PRESENT. Cryptology ePrint Archive. 2011;.
- PRESENT: An ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings 9. Springer; 2007. p. 450–466.
- Multiplicative differentials. In: Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven, Belgium, February 4–6, 2002 Revised Papers 9. Springer; 2002. p. 17–33.
- Lai X, Massey JL. A proposal for a new block encryption standard. In: Advances in Cryptology—EUROCRYPT’90: Workshop on the Theory and Application of Cryptographic Techniques Aarhus, Denmark, May 21–24, 1990 Proceedings 9. Springer; 1991. p. 389–404.
- C-differentials, multiplicative uniformity, and (almost) perfect c-nonlinearity. IEEE Transactions on Information Theory. 2020;66(9):5781–5789.
- Differential biases, c𝑐citalic_c-differential uniformity, and their relation to differential attacks. arXiv preprint arXiv:220803884. 2022;.
- Differential attacks: using alternative operations. Designs, Codes and Cryptography. 2019;87:225–247.
- On properties of translation groups in the affine general linear group with applications to cryptography. Journal of Algebra. 2021;569:658–680.
- On some block ciphers and imprimitive groups. Applicable algebra in engineering, communication and computing. 2009;20(5-6):339–350.
- On hidden sums compatible with a given block cipher diffusion layer. Discrete Mathematics. 2019;342(2):373–386.
- Regular subgroups with large intersection. Annali di Matematica Pura ed Applicata (1923-). 2019;198(6):2043–2057.
- Dixon JD. Maximal abelian subgroups of the symmetric groups. Canadian Journal of Mathematics. 1971;23(3):426–438.
- The Magma algebra system I: The user language. Journal of Symbolic Computation. 1997;24(3-4):235–265.
- Leander G, Poschmann A. On the classification of 4 bit S-boxes. In: Arithmetic of Finite Fields: First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007. Proceedings 1. Springer; 2007. p. 159–176.
- Zajac P, Jókay M. Cryptographic properties of small bijective S-boxes with respect to modular addition. Cryptography and Communications. 2020;12:947–963.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.