Jump to content

Rotational cryptanalysis

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Materialscientist (talk | contribs) at 11:12, 4 November 2014 (Reverted edits by 115.249.130.58 (talk) to last version by Yobot). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In cryptography, rotational cryptanalysis is a generic cryptanalytic attack against algorithms that rely on three operations: modular addition, rotation and XORARX for short. Algorithms relying on these operations are popular because they are relatively cheap in both hardware and software and run in constant time, making them safe from timing attacks in common implementations.

The term "rotational cryptanalysis" was coined by Dmitry Khovratovich and Ivica Nikolić in 2010 paper "Rotational Cryptanalysis of ARX", which presented the best cryptanalytic attacks at that time against a reduced-round Threefish cipher — part of Skein (hash function), a SHA-3 competition candidate.[1][2] A follow-up attack from the same authors and Christian Rechberger breaks collision resistance of up to 53 of 72 rounds in Skein-256, and 57 of 72 rounds in Skein-512. It also affects the Threefish cipher.[3]

References

  1. ^ Dmitry Khovratovich and Ivica Nikolić (2010). "Rotational Cryptanalysis of ARX" (PDF). University of Luxembourg. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Bruce Schneier (2010-02-07). "Schneier on Security: New Attack on Threefish".
  3. ^ Dmitry Khovratovich, Ivica Nikolic, Christian Rechberger (2010-10-20). "Rotational Rebound Attacks on Reduced Skein". {{cite journal}}: Cite journal requires |journal= (help)CS1 maint: multiple names: authors list (link)