Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Resistance Against Iterated Attacks by Decorrelation Revisited
 
conference paper

Resistance Against Iterated Attacks by Decorrelation Revisited

Bay, Asli  
•
Mashatan, Atefeh  
•
Vaudenay, Serge  
2012
Advances in Cryptology - Crypto 2012
CRYPTO 2012

Iterated attacks are comprised of iterating adversaries who can make $d$ plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher $C$ and the ideal random cipher $C^$ based on all bits. In EUROCRYPT '99, Vaudenay showed that a $2d$-decorrelated cipher resists to iterated attacks of order $d$ when iterations make almost no common queries. Then, he first asked what the necessary conditions are for a cipher to resist a non-adaptive iterated attack of order $d$. Secondly, he speculated that repeating a plaintext query in different iterations does not provide any advantage to a non-adaptive distinguisher. We close here these two long-standing open problems. We show that, in order to resist non-adaptive iterated attacks of order $d$, decorrelation of order $2d-1$ is not sufficient. We do this by providing a counterexample consisting of a cipher decorrelated to the order $2d-1$ and a successful non-adaptive iterated attack of order $d$ against it. Moreover, we prove that the aforementioned claim is wrong by showing that a higher probability of having a common query between different iterations can translate to a high advantage of the adversary in distinguishing $C$ from $C^$. We provide a counterintuitive example consisting of a cipher decorrelated to the order $2d$ which can be broken by an iterated attack of order 1 having a high probability of common queries.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-642-32009-5_43
Author(s)
Bay, Asli  
Mashatan, Atefeh  
Vaudenay, Serge  
Date Issued

2012

Publisher

Springer

Published in
Advances in Cryptology - Crypto 2012
Series title/Series vol.

Lecture Notes in Computer Science (LNCS); 7417

Start page

741

End page

757

Subjects

block ciphers

•

decorrelation theory

•

iterated attacks

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
CRYPTO 2012

Santa Barbara, USA

August 19-23, 2012

Available on Infoscience
August 29, 2012
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/85142
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés