Cryptanalysis of Block Ciphers Seminar (203.4325) - Spring 2013


Spring 2013 General Information

Syllabus:

Course's staff

Class hours

Grading policy

You must attend at least 10 meetings to pass the course.

Prerequisites and Requirements

M.Sc. students may take the course without the prerequisite (they have background in probability), but it is their responsibility to read the slides of the course Introduction to Cryptography (203.4444) before the semester begins. Undergradute students must satisfy the prerequisite.

Announcements


Lecture slides

TopicLectureSlidesComments
Introduction - DES and AES10/3PDF 
Differential Cryptanalysis10/3,17/3,19/3,7/4PDF 
Bits and Pieces12/5PDF 

The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.


The Papers for the Seminar

Statistical and Structural Attacks

NumberTitleAuthorsPublication InformationPaperStudent
S1 The Block Cipher Square Joan Daemen, Lars R. Knudsen, and Vincent Rijmen FSE 1997, pp. 149-165 Postscript  
S2 Miss in the Middle Attacks on IDEA and Khufu Eli Biham, Alex Biryukov, and Adi Shamir FSE 1999, pp. 124-138 Gzipped Postscript  
S3 The Boomerang Attack David Wagner FSE 1999, pp. 156-170 Postscript  
S4 Structural Cryptanalysis of SASAS Alex Biryukov and Adi Shamir Eurocrypt 2001, pp. 394-405 PDF  
S5 Related-Key Boomerang and Rectangle Attacks Eli Biham, Orr Dunkelman, and Nathan Keller Eurocrypt 2005, pp. 507-525 PDF  
S6 A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony Orr Dunkelman, Nathan Keller, Adi Shamir Crypto 2010, pp. 393-410 PDF  

Related-Key and Slide Attacks

NumberTitleAuthorsPublication InformationPaperStudent
RK1 New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Journal of Cryptology, Vol. 7, No. 4, pp. 229-246 (1994) Technical report  
RK2 Slide Attacks Alex Biryukov and David Wagner FSE 1999, pp. 245-259 Postscript  
RK3 Advanced Slide Attacks Alex Biryukov and David Wagner Eurocrypt 2000, pp. 589-606 PDF  
RK4 Improved Slide Attacks Eli Biham, Orr Dunkelman, and Nathan Keller FSE 2007, pp. 153-166 PDF  

Generic Attacks

NumberTitleAuthorsPublication InformationPaperStudent
G1 Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Paul C. van Oorschot and Michael J. Wiener Crypto 1996, pp. 229-236 PDF  
G2 Attacking Triple Encryption Stefan Lucks FSE 1998, pp. 239-253 Gzipped PS  
G3 The Full Cost of Cryptanalytic Attacks Michael J. Wiener Journal of Cryptology Vol. 17 No. 2, pp. 105-124 (2004) PDF  
G4 Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir Crypto 2012, pp. 719-740 Full version  

AES' Security

NumberTitleAuthorsPublication InformationPaperStudent
AES1 A Meet-in-the-Middle Attack on 8-Round AES Huseyin Demirci and Ali Aydin Selcuk FSE 2008, pp. 116-126 PDF  
AES2 New Impossible Differential Attacks on AES Jiqiang Lu, Orr Dunkelman, Nathan Keller, and Jongsung Kim Indocrypt 2008, pp. 279-293 Full version  
AES3 Distinguisher and Related-Key Attack on the Full AES-256 Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolic CRYPTO 2009, pp. 231-249 PDF  
AES4 Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir Eurocrypt 2010, pp. 299-319 PDF  
AES5 Biclique Cryptanalysis of the Full AES Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger Asiacrypt 2011, pp. 344-371 Full version  
AES6 Low Data Complexity Attacks on AES Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, and Vincent Rijmen IEEE Transactions on Information Theory Vol. 58 No. 11, pp. 7002-7017 (2012) Full version  

One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.

Please note that you must send slides in PDF format after your presentation to Orr, for the lecture to be counted for.


The Seminar's Schedule

Date Student Paper Presentation
28/4 Ohad G1 - Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude PDF
28/4 Raz S4 - Structural Cryptanalysis of SASAS PDF
5/5 Tomer S3 - The Boomerang Attack PDF
5/5 Gal S2 - Miss in the Middle Attacks on IDEA and Khufu PDF
19/5 Muhammad AES2 - New Impossible Differential Attacks on AES PDF
2/6 Ilya G3 - The Full Cost of Cryptanalytic Attacks PDF
9/6 Michael RK3 - Advanced Slide Attacks PDF
9/6 Almog AES1 - A Meet-in-the-Middle Attack on 8-Round AES PDF
16/6 Nael RK1 - New Types of Cryptanalytic Attacks Using Related Keys PDF
16/6 Nadav RK2 - Slide Attacks PDF

Note that this schedule is not final, and may be changed!

The order between the speakers of the same class, to be determined between them (or if no agreement is found, by a coin flip).