Abstract
In this paper we compare systems of multivariate polynomials, which completely define the block ciphers Khazad, Misty1, Kasumi, Camellia, Rijndael and Serpent in the view of a potential danger of an algebraic re-linearization attack.
The work described in this paper has been supported in part by the Commission of the European Communities through the IST Programme under Contract IST-1999-12324 and by the Concerted Research Action (GOA) Mefisto.
Chapter PDF
References
Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the advanced encryption standard, Available from http://www.cl.cam.ac.uk/~rja14/serpent.html
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit block cipher suitable for multiple platforms. Submission to NESSIE (September 2000), Available from http://www.cryptonessie.org/workshop/submissions.html
Barreto, P., Rijmen, V.: The KHAZAD legacy-level block cipher. Submission to NESSIE (September 2000), Available from http://www.cryptonessie.org/workshop/submissions.html
Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392–407. Springer, Heidelberg (2000)
Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267–287. Springer, Heidelberg (2002), Earlier version available from http://www.iacr.org
Daemen, J., Rijmen, V.: AES proposal: Rijndael. Selected as the Advanced Encryption Standard, Available from http://www.nist.gov/aes
Murphy, S., Robshaw, M.: Essential algebraic structure within the AES. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 17–38. Springer, Heidelberg (2002) NES/DOC/RHU/WP5/022/1
Shamir, A., Kipnis, A.: Cryptanalysis of the HFE public key cryptosystem. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 19–30. Springer, Heidelberg (1999)
Takeda, E.: ”Misty1”. Submission to NESSIE (September 2000), Available from http://www.cryptonessie.org/workshop/submissions.html
Third Generation Partnership Project, 3GPP KASUMI evaluation report, tech. rep., Security Algorithms Group of Experts, SAGE (2001), Available from http://www.3gpp.org/TB/other/algorithms/KASUMI_Eval_rep_v20.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biryukov, A., De Cannière, C. (2003). Block Ciphers and Systems of Quadratic Equations. In: Johansson, T. (eds) Fast Software Encryption. FSE 2003. Lecture Notes in Computer Science, vol 2887. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39887-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-39887-5_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20449-7
Online ISBN: 978-3-540-39887-5
eBook Packages: Springer Book Archive