11.07.2015 Views

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2An Extended Example: The Block-Cipher KeeloqThe purpose of this chapter is to supply a new, feasible, and economicallyrelevant example of algebraic cryptanalysis. The block cipher “Keeloq” 1 is used inthe keyless-entry system of most luxury automobiles. It has a secret key consistingof 64 bits, takes a plaintext of 32 bits, and outputs a ciphertext of 32 bits. Thecipher consists of 528 rounds. Our attack is faster than brute force by a factor ofaround 2 14.77 as shown in Section 2.4.7 on page 26. A summary will be given inSection 2.5 on page 32.This attack requires around 0.6×2 32 plaintexts, or 60% of the entire dictionary,as calculated in Section 2.4.5 on page 22. This chapter is written in the “chosenplaintext attack” model, in that we assume that we can request the encryption ofany plaintext and receive the corresponding ciphertext as encrypted under the secretkey that we are to trying guess. This will be mathematically represented by oracleaccess to E k ( ⃗ P ) = ⃗ C.However, it is easy to see that random plaintexts wouldpermit the attack to proceed identically.1 This is to be pronounced “key lock.”6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!