11.07.2015 Views

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

ALGORITHMS FOR SOLVING LINEAR AND POLYNOMIAL ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.4 Our Attack2.4.1 A Particular Two Function RepresentationRecall that each 64th round uses the same key bit. In other words, the samebit is used in rounds t, t + 64, t + 128, . . .. Note further, 528 = 8 × 64 + 16. Thus thekey bits k 15 , . . . , k 0 are used nine times, and the key bits k 63 , . . . , k 16 are used eighttimes.asWith this in mind, it is clear that the operation of the cipher can be representedE k ( P ⃗ ) = g k (f k (f k (· · · f} {{ } k ( P ⃗ ) = g k (f (8)k( P ⃗ )) = C ⃗8 timeswhere the f k represents 64 rounds, and the g k the final 16 “extra” rounds.2.4.2 Acquiring an f (8)k-oracleSuppose we simply guess the 16 bits of the key denoted k 15 , . . . , k 0 . Of course,we will succeed with probability 2 −16 . But at that point, we can evaluate g k or itsinverse g −1k . Then, g −1k(E k( P ⃗ )) = g −1k (g k(f (8)k ( P ⃗ ))) = f (8)k ( P ⃗ )and our oracle for E k now gives rise to an oracle for f (8)k .18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!