11.07.2015 Views

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of ContentsList of TablesList of FiguresList of Abbreviationsxvxviixix1 Summary 1I Polynomial Systems 52 An Extended Example: The Block-Cipher Keeloq 62.1 Special Acknowledgment of Joint Work . . . . . . . . . . . . . . . . . 72.2 Notational Conventions and Terminology . . . . . . . . . . . . . . . . 72.3 The Formulation of Keeloq . . . . . . . . . . . . . . . . . . . . . . . . 82.3.1 What is Algebraic Cryptanalysis? . . . . . . . . . . . . . . . . 82.3.2 The CSP Model . . . . . . . . . . . . . . . . . . . . . . . . . . 82.3.3 The Keeloq Specification . . . . . . . . . . . . . . . . . . . . . 92.3.4 Modeling the Non-linear Function . . . . . . . . . . . . . . . . 102.3.5 I/O Relations and the NLF . . . . . . . . . . . . . . . . . . . 112.3.6 Disposing of the Secret Key Shift-Register . . . . . . . . . . . 122.3.7 Describing the Plaintext Shift-Register . . . . . . . . . . . . . 122.3.8 The Polynomial System of Equations . . . . . . . . . . . . . . 132.3.9 Variable and Equation Count . . . . . . . . . . . . . . . . . . 142.3.10 Dropping the Degree to Quadratic . . . . . . . . . . . . . . . 142.3.11 Fixing or Guessing Bits in Advance . . . . . . . . . . . . . . . 162.3.12 The Failure of a Frontal Assault . . . . . . . . . . . . . . . . . 162.4 Our Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182.4.1 A Particular Two Function Representation . . . . . . . . . . . 182.4.2 Acquiring an f (8)k-oracle . . . . . . . . . . . . . . . . . . . . . 182.4.3 The Consequences of Fixed Points . . . . . . . . . . . . . . . . 192.4.4 How to Find Fixed Points . . . . . . . . . . . . . . . . . . . . 202.4.5 How far must we search? . . . . . . . . . . . . . . . . . . . . . 222.4.6 Fraction of Plainspace Required . . . . . . . . . . . . . . . . . 232.4.7 Comparison to Brute Force . . . . . . . . . . . . . . . . . . . 252.4.8 Some Lemmas . . . . . . . . . . . . . . . . . . . . . . . . . . . 262.4.9 Cycle Lengths in a Random Permutation . . . . . . . . . . . . 292.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322.6 A Note about Keeloq’s Utilization . . . . . . . . . . . . . . . . . . . . 34xi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!