Higher Order Derivatives and Differential Cryptanalysis

  • Xuejia Lai
Part of the The Springer International Series in Engineering and Computer Science book series (SECS, volume 276)

Abstract

High-order derivatives of multi-variable functions are studied in this paper as a natural generalization of the basic concept used in differential cryptanalysis. Possible applications of such derivatives in cryptology are discussed.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    X. Lai and J. L. Massey, “A Proposal for a New Block Encryption Standard” Advances in Cryptology - EUROCRYPT’90, Proceedings, LNCS 473 pp. 389–404, Springer-Verlag, Berlin, 1991.Google Scholar
  2. [2]
    E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems” Advances in Cryptology - CRYPTO’90 Proceedings LNCS 537, pp. 2–21, Springer-Verlag, Berlin 1991.Google Scholar
  3. [3]
    E. Biham and A. Shamir, “Differential Cryptanalysis of the full 16-round DES” Abstracts of CRYPTO’92. Google Scholar
  4. [4]
    E. Biham and A. Shamir, “Differential Cryptanalysis of FEAL and N-Hash” Advances in Cryptology - EUROCRYPT’91 Proceedings LNCS 547, pp. 1–16, Springer-Verlag, Berlin 1991.Google Scholar
  5. [5]
    E. Biham and A. Shamir, “Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer” Advances in Cryptology - CRYPTO’91 Proceedings LNCS 576, pp. 156–171, Springer-Verlag, Berlin 1992.Google Scholar
  6. [6]
    X. Lai, J. L. Massey and S. Murphy, “Markov Ciphers and Differential Cryptanalysis” Advances in Cryptology - EUROCRYPT’91 Proceedings LNCS 547, pp. 17–38, Springer-Verlag, Berlin, 1991.Google Scholar
  7. [7]
    C. Harpes, “Notes on High Order Differential Cryptanalysis of DES,” Internal report, Signal and Information Processing Laboratory, Swiss Federal Institute of Technology, August 12, 1993.Google Scholar
  8. [8]
    E. Biham, “Higher Order Differential Cryptanalysis,” (Preliminary draft) August 13, 1993.CrossRefGoogle Scholar
  9. [9]
    D. Chaum and J.H. Evertse, “Cryptanalysis of DES with a reduced number of rounds,” Advances in Cryptology - CRYPTO’85 Proceedings pp. 192–211, Springer-Verlag, 1986.Google Scholar
  10. [10]
    J.H. Evertse, “Linear structures in block ciphers,” Advances in Cryptology - EUROCRYPT’87 Proceedings pp. 249–266, Springer-Verlag, 1988.Google Scholar
  11. [11]
    W. Meier and O. Staffelbach, “Nonlinearity criteria for cryptographic functions,” Advances in Cryptology - EUROCRYPT’89 Proceedings pp. 549–562, Springer-Verlag, 1990.Google Scholar
  12. [12]
    K. Nyberg, “On the construction of highly nonlinear permutations,” Advances in Cryptology - EUROCRYPT’92 Proceeding s, pp. 92–98, Springer-Verlag, 1993.Google Scholar

Copyright information

© Springer Science+Business Media New York 1994

Authors and Affiliations

  • Xuejia Lai
    • 1
  1. 1.R3 Security Engineering AGAathalSwitzerland

Personalised recommendations