Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Revisiting Iterated Attacks in the Context of Decorrelation Theory
 
research article

Revisiting Iterated Attacks in the Context of Decorrelation Theory

Bay, Asli  
•
Mashatan, Atefeh
•
Vaudenay, Serge  
2014
Cryptography and Communications

Iterated attacks are comprised of iterating adversaries who can make d plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher C and the perfect cipher C* based on all bits. Vaudenay showed that a 2d-decorrelated cipher resists to iterated attacks of order d. when iterations have almost no common queries. Then, he first asked what the necessary conditions are for a cipher to resist a non-adaptive iterated attack of order d. I.e., whether decorrelation of order 2d-1 could be sufficient. Secondly, he speculated that repeating a plaintext query in different iterations does not provide any advantage to a non-adaptive distinguisher. We close here these two long-standing open problems negatively. For those questions, we provide two counter-intuitive examples. We also deal with adaptive iterated adversaries who can make both plaintext and ciphertext queries in which the future queries are dependent on the past queries. We show that decorrelation of order 2d protects against these attacks of order d. We also study the generalization of these distinguishers for iterations making non-binary outcomes. Finally, we measure the resistance against two well-known statistical distinguishers, namely, differential-linear and boomerang distinguishers and show that 4-decorrelation degree protects against these attacks.

  • Files
  • Details
  • Metrics
Type
research article
DOI
10.1007/s12095-014-0101-x
Web of Science ID

WOS:000346437800001

Author(s)
Bay, Asli  
Mashatan, Atefeh
Vaudenay, Serge  
Date Issued

2014

Published in
Cryptography and Communications
Volume

6

Issue

4

Start page

279

End page

311

Subjects

Block ciphers

•

Decorrelation Theory

•

Iterated attacks

•

Differential-linear distinguishers

•

Boomerang distinguishers

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Available on Infoscience
November 17, 2014
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/108909
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés