Feb. 2, 2024, 8:54 a.m. |

IACR News www.iacr.org

ePrint Report: Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing

Antonio Flórez-Gutiérrez, Yosuke Todo


In some linear key recovery attacks, the function which determines the value of the linear approximation from the plaintext, ciphertext and key is replaced by a similar map in order to improve the time or memory complexity at the cost of a data complexity increase. We propose a general framework for key recovery map substitution, and introduce Walsh spectrum puncturing, which consists of removing carefully-chosen …

attacks ciphertext eprint report function key linear map memory order plaintext recovery report spectrum todo value

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto