eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2014/860

Differential Factors: Improved Attacks on SERPENT

Cihangir Tezcan and Ferruh Özbudak

Abstract

A differential attack tries to capture the round keys corresponding to the S-boxes activated by a differential. In this work, we show that for a fixed output difference of an S-box, it may not be possible to distinguish the guessed keys that have a specific difference. We introduce these differences as differential factors. Existence of differential factors can reduce the time complexity of differential attacks and as an example we show that the 10, 11, and 12-round differential-linear attacks of Dunkelman et al. on SERPENT can actually be performed with time complexities reduced by a factor of 4, 4, and 8, respectively.

Note: Some typos are corrected.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Lightsec 2014
Keywords
S-boxdifferential factorSerpentdifferential-linear attack
Contact author(s)
cihangir @ metu edu tr
History
2014-11-02: revised
2014-10-22: received
See all versions
Short URL
https://ia.cr/2014/860
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/860,
      author = {Cihangir Tezcan and Ferruh Özbudak},
      title = {Differential Factors: Improved Attacks on SERPENT},
      howpublished = {Cryptology ePrint Archive, Paper 2014/860},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/860}},
      url = {https://eprint.iacr.org/2014/860}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.