Chrome Extension
WeChat Mini Program
Use on ChatGLM

Improved Linear Cryptanalysis of Block Cipher BORON

Computer Journal(2024)CCF BSCI 4区

Chinese Acad Sci | Univ Chinese Acad Sci

Cited 0|Views49
Abstract
BORON is a lightweight substitution-permutation network cipher proposed in 2017. We reduce the number of guessed key bits by key-bridging technology and first utilize Fast Walsh Transform on BORON to minimize the time complexity. Finally, this paper gives the better key-recovery attack against block cipher BORON than previously proposed by 2 rounds: we realize a 11-round key-recovery attack on BORON-80 and 13-round key-recovery attack on BORON-128. The attacks proposed in this paper are the best attacks against BORON-80/128 to date.
More
Translated text
Key words
BORON,linear cryptanalysis,key-bridging technique,FWT
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Related Papers
Kaisa Nyberg, Prinz Eugen-StraBe
1994

被引用385 | 浏览

Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper

要点】:本文提出了一种改进的线性密码分析技术,成功降低了攻击BORON块密码所需猜测的关键比特数,并首次应用快速沃尔什变换以减少时间复杂度,实现了目前最有效的BORON-80和BORON-128密钥恢复攻击。

方法】:通过关键桥接技术减少猜测关键比特数,结合快速沃尔什变换进行密码分析。

实验】:本文对BORON-80实现了11轮密钥恢复攻击,对BORON-128实现了13轮密钥恢复攻击,所用数据集未在文中明确提及,但实验基于BORON密码的已知结构和特性进行。这些攻击是目前对BORON-80/128已知最有效的攻击方法。