Key scheduling in DES type cryptosystems
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
LOKI—a cryptographic primitive for authentication and secrecy applications
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Fast data encipherment algorithm FEAL
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Strengthening the Key Schedule of the AES
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Analysis of SHA-1 in Encryption Mode
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Higher Order Differential Attack Using Chosen Higher Order Differences
SAC '98 Proceedings of the Selected Areas in Cryptography
Differential Cryptanalysis of Reduced Rounds of GOST
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Higher Order Differential Attak of CAST Cipher
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
On the Security of Double and 2-Key Triple Modes of Operation
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Cryptanalysis of Rijndael
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Related Key Attacks on Reduced Round KASUMI
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
3D: A Three-Dimensional Block Cipher
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Related-key rectangle attack on 43-round SHACAL-2
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A theoretical treatment of related-key attacks: RKA-PRPS, RKA-PRFs, and applications
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
X-FCSR: a new software oriented stream cipher based upon FCSRs
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
The delicate issues of addition with respect to XOR differences
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Correlated keystreams in MOUSTIQUE
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Some (in)sufficient conditions for secure hybrid encryption
Information and Computation
Another look at complementation properties
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Pseudorandom functions and permutations provably secure against related-key attacks
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Cryptanalysis of a generalized unbalanced feistel network structure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Linearity within the SMS4 block cipher
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Notions and relations for RKA-secure permutation and function families
Designs, Codes and Cryptography
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
AES variants secure against related-key differential and boomerang attacks
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
On cipher-dependent related-key attacks in the ideal-cipher model
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Related-key rectangle attack on 42-round SHACAL-2
ISC'06 Proceedings of the 9th international conference on Information Security
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Differential and rectangle attacks on reduced-round SHACAL-1
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Amplifying side-channel attacks with techniques from block cipher cryptanalysis
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
How to enhance the security of the 3GPP confidentiality and integrity algorithms
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
On the security of NOEKEON against side channel cube attacks
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Related-key attacks on the full-round cobra-f64a and cobra-f64b
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Cryptography secure against related-key attacks and tampering
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
A related-key attack on block ciphers with weak recurrent key schedules
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Linear fault analysis of block ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
The security of elastic block ciphers against key-recovery attacks
ISC'07 Proceedings of the 10th international conference on Information Security
Neuro-Cryptanalysis of DES and Triple-DES
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
RKA security beyond the linear barrier: IBE, encryption and signatures
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Hi-index | 0.00 |
In this paper we study the influence of key scheduling algorithms on the strength of blockciphers. We show that the key scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockciphers. Two new types of attacks are described: New chosen plaintext reductions of the complexity of exhaustive search attacks (and the faster variants based on complementation properties), and new low-complexity chosen key attacks. These attacks are independent of the number of rounds of the cryptosystems and of the details of the F-function and may have very small complexities. These attacks show that the key scheduling algorithm should be carefully designed and that its structure should not be too simple. These attacks are applicable to both variants of LOKI and to Lucifer. DES is not vulnerable to the related keys attacks since the shift pattern in the key scheduling algorithm is not the same in all the rounds.