Courtois, NT;
(2021)
A nonlinear invariant attack on T-310 with the original Boolean function.
Cryptologia
, 45
(2)
pp. 178-192.
10.1080/01611194.2020.1736207.
Preview |
Text
real_life_Z_515.pdf - Accepted Version Download (837kB) | Preview |
Abstract
There are numerous results on nonlinear invariant attacks on T-310. In all such attacks found so far, both the Boolean functions and the cipher wiring were contrived and chosen by the attacker. In this article, we show how to construct an invariant attack with the original Boolean function that was used to encrypt government communications in the 1980s.
Type: | Article |
---|---|
Title: | A nonlinear invariant attack on T-310 with the original Boolean function |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1080/01611194.2020.1736207 |
Publisher version: | https://doi.org/10.1080/01611194.2020.1736207 |
Language: | English |
Additional information: | This version is the author accepted manuscript. For information on re-use, please refer to the publisher's terms and conditions. |
Keywords: | algebraic cryptanalysis; annihilators; Boolean functions; Feistel ciphers; generalized linear cryptanalysis; k-normality; polynomial invariantsT-310 |
UCL classification: | UCL UCL > Provost and Vice Provost Offices UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/10133689 |
Downloads since deposit
62Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months
Archive Staff Only
View Item |