+44 (0)1509 263171
Please use this identifier to cite or link to this item:
|Title: ||Higher order differentiation over finite fields with applications to generalising the cube attack|
|Authors: ||Salagean, A.M.|
Phan, Raphael C.-W.
|Keywords: ||Higher order differentiation|
Higher order derivative
|Issue Date: ||2016|
|Publisher: ||Springer © The Author(s)|
|Citation: ||SALAGEAN, A.M. ... et al, 2016. Higher order differentiation over finite fields with applications to generalising the cube attack. Designs, Codes and Cryptography, doi:10.1007/s10623-016-0277-5.|
|Abstract: ||Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber. All of the above have been developed for the binary case. We examine differentiation in larger fields, starting with the field GF(p) of integers modulo a prime p, and apply these techniques to generalising the cube attack to GF(p). The crucial difference is that now the degree in each variable can be higher than one, and our proposed attack will differentiate several times with respect to each variable (unlike the classical cube attack and its larger field version described by Dinur and Shamir, both of which differentiate at most once with respect to each variable). Connections to the Moebius/Reed Muller Transform over GF(p) are also examined. Finally we describe differentiation over finite fields GF(ps) with ps elements and show that it can be reduced to differentiation over GF(p), so a cube attack over GF(ps) would be equivalent to cube attacks over GF(p).|
|Description: ||This is an Open Access Article. It is published by Springer under the Creative Commons Attribution 4.0 International Licence (CC BY). Full details of this licence are available at http://creativecommons.org/licenses/by/4.0/|
|Publisher Link: ||http://dx.doi.org/10.1007/s10623-016-0277-5|
|Appears in Collections:||Published Articles (Computer Science)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.