Improved differential attacks on rectangle

Download
2017
Şenol, Asuman
Differential attacks aim to capture the round keys by examining the changes in the output when a small change is applied to the input. This method is based on examining the differential behavior of the cryptosystem and guessing the affected round keys by using candidate plaintext and ciphertext pairs. It was shown that it may not be possible for the attacker to fully uncover the guessed keys. This situation occurs when the cipher contains S-boxes after the key addition layer and the guessed keys have a specific difference for a fixed S-box output difference for some S-boxes. Such an S-box property is called a differential factor. Because of the uncovered keys which is caused by not taking differential factors into account, attacks in the literature obtained by theoretical methods may not work correctly in practice. In addition to that, more powerful differential attacks can be proposed with undisturbed bits because these bits provide discovering longer differential characteristics. As these attacks are corrected by considering differential factors and undisturbed bits, the claimed time complexity may increase or decrease. Rectangle and Present are two lightweight block ciphers with SPN structure and their S-boxes have differential factors and undisturbed bits. In this work, we corrected previously published differential attacks on Rectangle and on Present by the help of undisturbed bits and we showed that these attacks can actually be performed with time complexities reduced with the help of differential factors and undisturbed bits .

Suggestions

Analysis of Face Recognition Algorithms for Online and Automatic Annotation of Personal Videos
Yılmaztürk, Mehmet; Ulusoy Parnas, İlkay; Çiçekli, Fehime Nihan (Springer, Dordrecht; 2010-05-08)
Different from previous automatic but offline annotation systems, this paper studies automatic and online face annotation for personal videos/episodes of TV series considering Nearest Neighbourhood, LDA and SVM classification with Local Binary Patterns, Discrete Cosine Transform and Histogram of Oriented Gradients feature extraction methods in terms of their recognition accuracies and execution times. The best performing feature extraction method and the classifier pair is found out to be SVM classification...
Improved probabilistic decoding of interleaved Reed-Solomon codes and folded Hermitian codes
Özbudak, Ferruh (Elsevier BV, 2014-02-06)
Probabilistic simultaneous polynomial reconstruction algorithm of Bleichenbacher, Kiayias, and Yung is extended to the polynomials whose degrees are allowed to be distinct. Specifically, for a finite field F, positive integers n, r, t and distinct elements z(1), z(2), ... , z(n) is an element of F, we present a probabilistic algorithm which can recover polynomials p(1), p(2), p(r) is an element of F[x] of degree less than k(1), k(2), ... , k(r) respectively for a given instance < y(i), (1, ... ,) y(i,r)>(n)...
Improved SIFT matching for image pairs with scale difference
BAŞTANLAR, YALIN; Temizel, Alptekin; Yardimci, Y. (2010-03-04)
When directly applied to images with different scales, scale invariant feature transform (SIFT) matching performance decreases significantly. In this reported work, this phenomenon is demonstrated and a simple method to increase the performance of SIFT matching is proposed. The proposed method includes preprocessing the images before matching and is compared to previously proposed solutions which only eliminate false matches.
Upper bounds to error probability with feedback
Nakiboğlu, Barış (2010-01-22)
A new analysis technique is suggested for bounding the error probability of fixed length block codes with feedback on discrete memoryless channels from above. Error analysis is inspired by Gal lager's error analysis for block codes without feedback. Using Burnashev-Zigangirov-D'yachkov encoding scheme analysis recovers previously known best results on binary symmetric channels and improves up on the previously known best results on k-ary symmetric channels and binary input channels.
A heuristic procedure for a single-item dynamic lot sizing problem
Benli., Ömer S; Sabuncuoğlu, İhsan; Tüfekçi, Süleyman (Elsevier BV, 1988-1)
An O(T) heuristic proceudre for a single-item dynamic lot sizing problem is introduced in this paper. The algorithm tries to establish the regeneration points of the problem whether either the production or the beginning inventory must be equal to zero. The proposed algorithm is very easy to implement and compares very favourably with the existing heuristic procedures.
Citation Formats
A. Şenol, “Improved differential attacks on rectangle,” M.S. - Master of Science, Middle East Technical University, 2017.