UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

A nonlinear invariant attack on T-310 with the original Boolean function

Courtois, NT; (2021) A nonlinear invariant attack on T-310 with the original Boolean function. Cryptologia , 45 (2) pp. 178-192. 10.1080/01611194.2020.1736207. Green open access

[thumbnail of real_life_Z_515.pdf]
Preview
Text
real_life_Z_515.pdf - Accepted Version

Download (837kB) | Preview

Abstract

There are numerous results on nonlinear invariant attacks on T-310. In all such attacks found so far, both the Boolean functions and the cipher wiring were contrived and chosen by the attacker. In this article, we show how to construct an invariant attack with the original Boolean function that was used to encrypt government communications in the 1980s.

Type: Article
Title: A nonlinear invariant attack on T-310 with the original Boolean function
Open access status: An open access version is available from UCL Discovery
DOI: 10.1080/01611194.2020.1736207
Publisher version: https://doi.org/10.1080/01611194.2020.1736207
Language: English
Additional information: This version is the author accepted manuscript. For information on re-use, please refer to the publisher's terms and conditions.
Keywords: algebraic cryptanalysis; annihilators; Boolean functions; Feistel ciphers; generalized linear cryptanalysis; k-normality; polynomial invariantsT-310
UCL classification: UCL
UCL > Provost and Vice Provost Offices
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science
URI: https://discovery.ucl.ac.uk/id/eprint/10133689
Downloads since deposit
62Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item