Here the author will explain the attack that was the opening of his dissertation. The goal is first, to rewrite the cipher as a function g executed on the output of a function f which is iterated 8 times on the plaintext. Next, we will strip away g, and try to find fixed points of the 8th iterate of f. Some of these are fixed points of f. Using fixed points of f, we can recover the secret key by solving a polynomial system of equations. As you can see, the attack is rather indirect.
KeywordsSuccess Probability Constraint Satisfaction Problem Polynomial System Analytic Combinatorics Matching Property
Unable to display preview. Download preview PDF.