The MALICIOUS framework: embedding backdoors into tweakable block ciphers

T Peyrin, H Wang - Annual international cryptology conference, 2020 - Springer
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet
difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far …

TurboSHAKE

G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2023 - eprint.iacr.org
In a recent presentation, we promoted the use of 12-round instances of Keccak, collectively
called “TurboSHAKE”, in post-quantum cryptographic schemes, but without defining them …

Backdoored hash functions: immunizing HMAC and HKDF

M Fischlin, C Janson, S Mazaheri - 2018 IEEE 31st Computer …, 2018 - ieeexplore.ieee.org
Security of cryptographic schemes is traditionally measured as the inability of resource-
constrained adversaries to violate a desired security goal. The security argument usually …

Satoshi Nakamoto and the Origins of Bitcoin--The Profile of a 1-in-a-Billion Genius

J Ducrée - arXiv preprint arXiv:2206.10257, 2022 - arxiv.org
The mystery about the ingenious creator of Bitcoin concealing behind the pseudonym
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …

The reality of backdoored S-Boxes—An eye opener

S Fahd, M Afzal, W Iqbal, D Shah, I Khalid - Journal of Information Security …, 2024 - Elsevier
The real-life incidents researched in academia have revealed that (possibly) state-level
efforts are made to camouflage the intentional flaws in the mathematical layer of an S-Box …

Structural nonlinear invariant attacks on T-310: attacking arbitrary Boolean functions

NT Courtois - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Recent papers show how to construct polynomial invariant attacks for block ciphers,
however almost all such results are somewhat weak: invariants are simple and low degree …

On the existence of non-linear invariants and algebraic polynomial constructive approach to backdoors in block ciphers

NT Courtois - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt'95 (adapted to
Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making …

Lack of unique factorization as a tool in block cipher cryptanalysis

NT Courtois, A Patrick - arXiv preprint arXiv:1905.04684, 2019 - arxiv.org
Linear (or differential) cryptanalysis may seem dull topics for a mathematician: they are
about super simple invariants characterized by say a word on n= 64 bits with very few bits at …

Adapting Rigidity to Symmetric Cryptography: Towards" Unswerving" Designs

O Dunkelman, L Perrin - Proceedings of the 5th ACM workshop on …, 2019 - dl.acm.org
While designers of cryptographic algorithms are rarely considered as potential adversaries,
past examples, such as the standardization of the Dual EC PRNG highlights that the story …

Invariant hopping attacks on block ciphers

NT Courtois - arXiv preprint arXiv:2002.03212, 2020 - arxiv.org
Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to
numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is …