Rotational cryptanalysis
Template:Use ymd dates In cryptography, rotational cryptanalysis is a generic cryptanalytic attack against algorithms that rely on three operations: modular addition, rotation and XOR — ARX for short. Algorithms relying on these operations are popular because they are relatively cheap in both hardware and software and run in constant time, making them safe from timing attacks in common implementations.
The term "rotational cryptanalysis" was coined by Dmitry Khovratovich and Ivica Nikolić in 2010 paper "Rotational Cryptanalysis of ARX", which presents the best cryptanalytic attacks known to date against a reduced-round Threefish cipher — part of Skein (hash function), a SHA-3 competition candidate. The attack breaks 39 rounds out of 72 in Threefish-256, 42 of 72 in Threefish-512 and 43.5 out of 80 in Threefish-1024.[1][2]
References
- ^ Dmitry Khovratovich and Ivica Nikolić (2010). "Rotational Cryptanalysis of ARX" (PDF). University of Luxembourg.
{{cite journal}}
: Cite journal requires|journal=
(help) - ^ Bruce Schneier (2010-02-07). "Schneier on Security: New Attack on Threefish".