Block Cipher Attack Types Explained
Block Cipher Attack Types Explained
net/publication/344465037
Article in International Journal of Recent Technology and Engineering (IJRTE) · September 2020
DOI: 10.35940/ijrte.C4214.099320
CITATIONS READS
16 4,444
2 authors:
All content following this page was uploaded by Wageda Ibrahim Alsobky on 04 October 2020.
Published By:
Retrieval Number: 100.1/ijrte.C4214099320 Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.C4214.099320 28 and Sciences Publication
Different Types of Attacks on Block Ciphers
The plaintext to be encrypted are chosen by the attacker (but The S-box is constructed by the composition of two
attacker doesn't know the key) and then encrypts related transformations:[16]
1) Taking multiplicative inverse (x ) in GF (2 ) . (x ) is
plaintexts . Then statistical analysis is used by the 1 4 1
Published By:
Retrieval Number: 100.1/ijrte.C4214099320 Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.C4214.099320 29 and Sciences Publication
International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-9 Issue-3, September 2020
( 24 11) / 4
( 24 11)/ 4
45.09888 (14) Buchberger’s Algorithm
A monomial ordering is chosen.
Step 3:After estimating 'ᴦ' we will apply Grobner Bases Starting with any generating set
to this system to be solved. G {g 1 , g 2 , , g k } of I .
Selecting a pair of generators g i , g j from G .
V. GR o BNER BASES AS A METHOD TO ATTACK The remainder r when S ( g i , g j ) is divided by
G
Grobner is a classical method used to solve multivariate If r 0 then continue, otherwise add r to the
nonlinear system of equations. "Buchberger” developed the generating set G .
basic algorithm for computing Grobner Bases in 1965 [19]. Repeating from step 2 until processing all possible
The discovery of this algorithm solved many problems that pairs from G .
needed a computational treatment in commutative algebra, Note that adding generators to G at any time, suddenly
such as deciding whether a polynomial belongs to the ideal many more pairs have to be considered.
generated by some sequence of polynomials [20]. For more
In our case study, after applying Grobner Bases method to
understanding Grobner Bases, there are some definitions the mathematical model, then the Result will be as follows:
described as follows: (equations16-23)
Definition 3 [19]
The lexicographic order: is the order > such that
y x 1 y x 2 exactly when the first non-zero entry of the
vector x 1 x 2 is positive.
The graded lexicographic order: is the order > such that
y x 1 y x 2 , if deg y x 1 > deg y x 2 or
, and the first non-zero entry of x 1 x 2
x1 x2
deg y =deg y
is positive.
Published By:
Retrieval Number: 100.1/ijrte.C4214099320 Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.C4214.099320 30 and Sciences Publication
Different Types of Attacks on Block Ciphers
Table II: Results of the Case Study 10. Matsui, M. (1993, May). Linear cryptanalysis method for DES cipher.
In Workshop on the Theory and Application of Cryptographic
1 z 3 0 , (16)
Techniques (pp. 386-397). Springer, Berlin, Heidelberg.
11. Langford, S. K., & Hellman, M. E. (1994, August). Differential-linear
cryptanalysis. In Annual International Cryptology Conference (pp.
17-25). Springer, Berlin, Heidelberg.
z 2 z 22 0 (17) 12. Lee, S., Hong, S., Lee, S., Lim, J., & Yoon, S. (2001, December).
Truncated differential cryptanalysis of Camellia. In International
Conference on Information Security and Cryptology (pp. 32-38).
z1 0 (18)
Springer, Berlin, Heidelberg.
13. Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., & Sung, S. (2003,
December). Impossible differential cryptanalysis for block cipher
structures. In International Conference on Cryptology in India (pp.
z0 0 (19) 82-96). Springer, Berlin, Heidelberg.
14. Bard, G. (2009). Algebraic cryptanalysis. Springer Science &
Business Media.
15. Improved rijndael-like S-box and its transform domain
x3 0 (20) analysis2006Lecture Notes in Computer Science including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics)153-167
x2 0 (21) 16. Evaluating algebraic attacks on the AES2003Diplom thesis,
Technische
17. Generating S-Box Multivariate Quadratic Equation Systems And
Estimating Algebraic Attack Resistance Aided By SageMath20151-21
x1 0 (22) 18. Resistance of S-boxes against algebraic attacks2004Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics)83-93
x0 z2 0 (23) 19. Gröbner bases, Gaussian elimination and resolution of systems of
algebraic equations1983Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics)146-156
Then the resistance will be 20. An introduction to Gröbner bases1994American Mathematical Soc.
21. “Algebraic Construction of Powerful Substitution” International
( 3 2) / 4
(3 2)/ 4
0.707106 (24) Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277
3878, Volume-8 Issue-6, March 2020.
22. -“Performance Analysis of Advanced Encryption Standard (AES)
Hence the ratio of penetrating this S-box is S-boxes “International Journal of Recent Technology and Engineering
98.43209854%. This ratio means that this S-box has (IJRTE) ISSN: 2277-3878, Volume-9 Issue-1, May 2020.
23. ”A Review of Advanced Encryption Standard (AES) Performance”
weak algebraic structure. Benha Journal of Engineering Science and Technology (BJEST) ISSN:
2357-0105, Volume-1 Issue-1, July 2018
VI. CONCLUSION
In this paper, we have introduced different types of AUTHORS PROFILE
attacks on block ciphers .Also, we have used the algebraic Wageda Ibrahim Al Sobky was born in Egypt in
cryptanalysis type to convert the S-box into a system of 1981. She received the [Link]. degree in
communications and computers from benha
multivariate nonlinear equations . After that, we have solved faculty of engineering in 2003. She received the
it by a classical method called Grobner bases . Finally, we [Link]. degree in science from benha faculty of
have made an algebraic attack on the S-box by exploiting its science in 2008. She received the [Link]. in applied
weak algebraic construction. mathematics from Benha University, Cairo,
Egypt, in 2012 and the Ph.D. degree in
cryptography from Ain Shams University, Cairo, Egypt, in 2017. She is
REFERENCES currently a doctor in basic engineering sciences, at Benha Faculty of
Engineering, Benha University, Egypt. Her current research interests include
1. Christof Paar · Jan Pelzl2009Understanding Cryptography: A
data security, and cryptography.
Textbook for Students and PractitionersSpringer Heidelberg Dordrecht
London New York.
Hala Saeed Omar was born in Benha, Egypt in
2. William Stallings2011Cryptography and network security : principles
1993. She received the [Link]. degree in electrical
and practiceFifth edition. Boston Prentice Hall.
power engineering computers from benha faculty of
3. Blondeau, C., & Gérard, B. (2009, May). On the data complexity of
engineering in 2016. She is currently a demonstrator
statistical attacks against block ciphers. In Workshop on coding and
at Benha Faculty of Engineering, Benha University,
cryptography-wcc (Vol. 2009, pp. 469-488).
Egypt.
4. Weinmann, R. P. (2009). Algebraic methods in block cipher
cryptanalysis (Doctoral dissertation, Technische Universität).
5. The Laws of Cryptography with Java Code2003Available online at
Neal Wagner's home page1-334
6. Analysis of Development of Dynamic S-Box
Generation2017Computer Science and Information
Technology154-163
7. Cryptographic analysis of all 4 × 4-bit S-boxes2012Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics)118-133
8. Abomhara, M. (2015). Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber Security
and Mobility, 4(1), 65-88.
9. Lai, X., Massey, J. L., & Murphy, S. (1991, April). Markov ciphers and
differential cryptanalysis. In Workshop on the Theory and Application
of of Cryptographic Techniques (pp. 17-38). Springer, Berlin,
Heidelberg.
Published By:
Retrieval Number: 100.1/ijrte.C4214099320 Blue Eyes Intelligence Engineering
DOI:10.35940/ijrte.C4214.099320 31 and Sciences Publication
View publication stats