Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Algebraic Attacks Galore!

Algebraic Attacks Galore! This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Groups - Complexity - Cryptology de Gruyter

Algebraic Attacks Galore!

Groups - Complexity - Cryptology , Volume 1 (2) – Oct 1, 2009

Loading next page...
 
/lp/de-gruyter/algebraic-attacks-galore-oJqlvLHeEe
Publisher
de Gruyter
Copyright
© Heldermann Verlag
ISSN
1867-1144
eISSN
1869-6104
DOI
10.1515/GCC.2009.231
Publisher site
See Article on Publisher Site

Abstract

This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases.

Journal

Groups - Complexity - Cryptologyde Gruyter

Published: Oct 1, 2009

Keywords: Cryptosystem; algebraic attack; polynomial system solving

There are no references for this article.