Exploiting linearity of modular multiplication
buir.contributor.author | Yıldırım, Hamdi Murat | |
dc.citation.epage | 269 | en_US |
dc.citation.spage | 249 | en_US |
dc.citation.volumeNumber | 11989 LNCS | en_US |
dc.contributor.author | Yıldırım, Hamdi Murat | |
dc.coverage.spatial | Gebze, Turkey | en_US |
dc.date.accessioned | 2021-03-04T08:22:11Z | |
dc.date.available | 2021-03-04T08:22:11Z | |
dc.date.issued | 2020 | |
dc.department | Computer Technology and Information Systems | en_US |
dc.description | Date of Conference: 13-15 November 2019 | en_US |
dc.description | Conference Name: 8th International Conference on Mathematical Aspects of Computer and Information Sciences, MACIS 2019 | en_US |
dc.description.abstract | The XOR Open image in new window and the addition ⊞⊞ operations have been widely used as building blocks for many cryptographic primitives. These operations and the multiplication ⊙⊙ operation are successively used in the design of IDEA and the MESH block ciphers. This work presents several interesting algebraic properties of the multiplication operation. By fixing one operand, we obtain vector valued function ggZggZ on Zn2Z2n, associated with ⊙⊙. In this paper we show that the nonlinearity of ggZggZ remains the same under some transformations of Z and moreover we give an upper bound for the nonlinearity of ggZggZ when Z is a power of 2. Under weak-key assumptions, we furthermore present a list of new linear relations for 1-round IDEA cipher, some of directly derived and others algorithmically generated using these relations and known ones. We extend the largest linear weak key class for IDEA cipher with size 223223 to derive such a class with sizes 224224. Under the independent key subblocks (subkeys) and weak-key assumptions we derive many linear relations for IDEA cipher using linear relations for 1-round IDEA cipher. | en_US |
dc.description.provenance | Submitted by Zeynep Aykut (zeynepay@bilkent.edu.tr) on 2021-03-04T08:22:11Z No. of bitstreams: 1 Exploiting_linearity_of_modular_multiplication.pdf: 481202 bytes, checksum: 3396455ebd7cfa08017c68e438895b47 (MD5) | en |
dc.description.provenance | Made available in DSpace on 2021-03-04T08:22:11Z (GMT). No. of bitstreams: 1 Exploiting_linearity_of_modular_multiplication.pdf: 481202 bytes, checksum: 3396455ebd7cfa08017c68e438895b47 (MD5) Previous issue date: 2020 | en |
dc.identifier.doi | 10.1007/978-3-030-43120-4_19 | en_US |
dc.identifier.isbn | 9783030431198 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/11693/75768 | |
dc.language.iso | English | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | https://dx.doi.org/10.1007/978-3-030-43120-4_19 | en_US |
dc.source.title | Lecture Notes in Computer Science | en_US |
dc.subject | IDEA cipher | en_US |
dc.subject | Nonlinearity | en_US |
dc.subject | Modular multiplication | en_US |
dc.subject | Boolean functions | en_US |
dc.subject | Cryptanalysis | en_US |
dc.title | Exploiting linearity of modular multiplication | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Exploiting_linearity_of_modular_multiplication.pdf
- Size:
- 469.92 KB
- Format:
- Adobe Portable Document Format
- Description:
- View / Download
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: