Startseite Mathematik Algebraic Attacks Galore!
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Algebraic Attacks Galore!

  • Martin Kreuzer
Veröffentlicht/Copyright: 10. März 2010
Veröffentlichen auch Sie bei De Gruyter Brill
Groups Complexity Cryptology
Aus der Zeitschrift Band 1 Heft 2

This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases.

Received: 2009-05-15
Published Online: 2010-03-10
Published in Print: 2009-October

© Heldermann Verlag

Heruntergeladen am 22.12.2025 von https://www.degruyterbrill.com/document/doi/10.1515/GCC.2009.231/html
Button zum nach oben scrollen