Topic | Lecture | Slides | Comments | Introduction - DES and AES | 10/3 | Differential Cryptanalysis | 10/3,17/3,19/3,7/4 | Bits and Pieces | 12/5 |
The slides are in PDF format. I may change the slides a little bit before and after the lecture. Be aware of changes.
Number | Title | Authors | Publication Information | Paper | Student |
S1 | The Block Cipher Square | Joan Daemen, Lars R. Knudsen, and Vincent Rijmen | FSE 1997, pp. 149-165 | Postscript | |
S2 | Miss in the Middle Attacks on IDEA and Khufu | Eli Biham, Alex Biryukov, and Adi Shamir | FSE 1999, pp. 124-138 | Gzipped Postscript | |
S3 | The Boomerang Attack | David Wagner | FSE 1999, pp. 156-170 | Postscript | |
S4 | Structural Cryptanalysis of SASAS | Alex Biryukov and Adi Shamir | Eurocrypt 2001, pp. 394-405 | ||
S5 | Related-Key Boomerang and Rectangle Attacks | Eli Biham, Orr Dunkelman, and Nathan Keller | Eurocrypt 2005, pp. 507-525 | ||
S6 | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | Orr Dunkelman, Nathan Keller, Adi Shamir | Crypto 2010, pp. 393-410 |
Number | Title | Authors | Publication Information | Paper | Student |
RK1 | New Types of Cryptanalytic Attacks Using Related Keys | Eli Biham | Journal of Cryptology, Vol. 7, No. 4, pp. 229-246 (1994) | Technical report | |
RK2 | Slide Attacks | Alex Biryukov and David Wagner | FSE 1999, pp. 245-259 | Postscript | |
RK3 | Advanced Slide Attacks | Alex Biryukov and David Wagner | Eurocrypt 2000, pp. 589-606 | ||
RK4 | Improved Slide Attacks | Eli Biham, Orr Dunkelman, and Nathan Keller | FSE 2007, pp. 153-166 |
Number | Title | Authors | Publication Information | Paper | Student |
G1 | Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude | Paul C. van Oorschot and Michael J. Wiener | Crypto 1996, pp. 229-236 | ||
G2 | Attacking Triple Encryption | Stefan Lucks | FSE 1998, pp. 239-253 | Gzipped PS | |
G3 | The Full Cost of Cryptanalytic Attacks | Michael J. Wiener | Journal of Cryptology Vol. 17 No. 2, pp. 105-124 (2004) | ||
G4 | Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir | Crypto 2012, pp. 719-740 | Full version |
Number | Title | Authors | Publication Information | Paper | Student |
AES1 | A Meet-in-the-Middle Attack on 8-Round AES | Huseyin Demirci and Ali Aydin Selcuk | FSE 2008, pp. 116-126 | ||
AES2 | New Impossible Differential Attacks on AES | Jiqiang Lu, Orr Dunkelman, Nathan Keller, and Jongsung Kim | Indocrypt 2008, pp. 279-293 | Full version | |
AES3 | Distinguisher and Related-Key Attack on the Full AES-256 | Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolic | CRYPTO 2009, pp. 231-249 | ||
AES4 | Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir | Eurocrypt 2010, pp. 299-319 | ||
AES5 | Biclique Cryptanalysis of the Full AES | Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger | Asiacrypt 2011, pp. 344-371 | Full version | |
AES6 | Low Data Complexity Attacks on AES | Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, and Vincent Rijmen | IEEE Transactions on Information Theory Vol. 58 No. 11, pp. 7002-7017 (2012) | Full version |
One week before your presentation, you must present your talk to Orr. Without doing so, you will not be able to present your talk to the class, and would fail.
Please note that you must send slides in PDF format after your presentation to Orr, for the lecture to be counted for.
Date | Student | Paper | Presentation |
28/4 | Ohad | G1 - Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude | |
28/4 | Raz | S4 - Structural Cryptanalysis of SASAS | |
5/5 | Tomer | S3 - The Boomerang Attack | |
5/5 | Gal | S2 - Miss in the Middle Attacks on IDEA and Khufu | |
19/5 | Muhammad | AES2 - New Impossible Differential Attacks on AES | |
2/6 | Ilya | G3 - The Full Cost of Cryptanalytic Attacks | |
9/6 | Michael | RK3 - Advanced Slide Attacks | |
9/6 | Almog | AES1 - A Meet-in-the-Middle Attack on 8-Round AES | |
16/6 | Nael | RK1 - New Types of Cryptanalytic Attacks Using Related Keys | |
16/6 | Nadav | RK2 - Slide Attacks |
Note that this schedule is not final, and may be changed!
The order between the speakers of the same class, to be determined between them (or if no agreement is found, by a coin flip).