Cryptanalysis Workshop Session 1

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=IvUrxL4EptY



Duration: 2:11:19
1,199 views
10


10:00 ΓÇô 11:00 AM Title: Unaligned Rebound Attack for KECCAK Speaker: Thomas Peyrin Affiliation: Nanyang Technological University, Singapore Abstract: In this talk, we analyze the internal permutations of KECCAK, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential paths for up to 5 rounds. We then use these unaligned differential paths and adapt the rebound attack in order to derive distinguishers for up to 8 rounds of the internal permutations of the submitted version of KECCAK. Our results have been implemented and verified experimentally on a small version of KECCAK and this is currently the best known differential attack against KECCAK. 11:00 AM ΓÇô 12:00 PM Title: Toward Extending Integral Based Known-Key Distinguisher on AES Speaker: Yu Sasaki Affiliation: NTT Corporation, Japan Abstract: We revisit the integral based known-key distinguisher on AES. First, we give a summary of two papers; the original distinguisher by Knudsen and Rijmen at Asiacrypt 2007 and its formalization called middletext distinguisher proposed by Minier et al. at Africacrypt 2009. We then point out that, with following the formalization by Minier et al., the previous integral known-key distinguisher can be extended to a 10-round middletext distinguisher.




Other Videos By Microsoft Research


2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Ashfaq Munshi
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Jessica Mezei
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Peter Binfield
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Jason Priem
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Lee Dirks
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Jevin West
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Alex Wade
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Sarah Greene
2016-08-16Welcome and Introductions: 2011 eScience Workshop-Transforming Scholarly Communication
2016-08-16Invited Demonstrations (Session II; 10 minutes/demonstrator) Alberto Accomazzi
2016-08-16Cryptanalysis Workshop Session 1
2016-08-16Sparsest Cut, Discrete Differentiation, and Local Rigidity of Sets in the Plane
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Moshe Pritsker
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Chris Lintott
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Charles Parnot
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Phil Bourne
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Tim Clark
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) David DeRoure
2016-08-16Invited Demonstrations (Session I; 10 minutes/demonstrator) Rafael Sidi
2016-08-16Andrew Herbert Career Celebration Workshop - You ainΓÇÖt seen nothing yet!
2016-08-16Serendipity and Spam



Tags:
microsoft research