Introduction to finite fields and their applications
Introduction to finite fields and their applications
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Quadratic Equations from APN Power Functions*A part of this paper was published in FSE 2004 [6].
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Almost perfect nonlinear power functions on GF(2n): the Welch case
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Algebraic attack studies ciphers from the point of view of solving equations. It is important to measure the security of block ciphers how many linearly independent bi-affine or quadratic equations they satisfy. As the S-box is the main nonlinear part of block ciphers, it really makes sense to get the number of linearly independent bi-affine and quadratic equations that an S-box satisfies to analyse the security of block ciphers. The article answers this question for two S-boxes based on APN power functions, and shows how to find out the equations by two toy examples. The techniques can be generalized to other S-boxes constructed by power functions. According to these conclusions, we can estimate the safety of such kind of block ciphers.