The MALICIOUS framework: embedding backdoors into tweakable block ciphers
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet
difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far …
difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far …
Backdoored hash functions: immunizing HMAC and HKDF
M Fischlin, C Janson, S Mazaheri - 2018 IEEE 31st Computer …, 2018 - ieeexplore.ieee.org
Security of cryptographic schemes is traditionally measured as the inability of resource-
constrained adversaries to violate a desired security goal. The security argument usually …
constrained adversaries to violate a desired security goal. The security argument usually …
Satoshi Nakamoto and the Origins of Bitcoin--The Profile of a 1-in-a-Billion Genius
J Ducrée - arXiv preprint arXiv:2206.10257, 2022 - arxiv.org
The mystery about the ingenious creator of Bitcoin concealing behind the pseudonym
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …
Satoshi Nakamoto has been fascinating the global public for more than a decade. Suddenly …
The reality of backdoored S-Boxes—An eye opener
The real-life incidents researched in academia have revealed that (possibly) state-level
efforts are made to camouflage the intentional flaws in the mathematical layer of an S-Box …
efforts are made to camouflage the intentional flaws in the mathematical layer of an S-Box …
Structural nonlinear invariant attacks on T-310: attacking arbitrary Boolean functions
NT Courtois - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Recent papers show how to construct polynomial invariant attacks for block ciphers,
however almost all such results are somewhat weak: invariants are simple and low degree …
however almost all such results are somewhat weak: invariants are simple and low degree …
On the existence of non-linear invariants and algebraic polynomial constructive approach to backdoors in block ciphers
NT Courtois - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt'95 (adapted to
Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making …
Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making …
Lack of unique factorization as a tool in block cipher cryptanalysis
NT Courtois, A Patrick - arXiv preprint arXiv:1905.04684, 2019 - arxiv.org
Linear (or differential) cryptanalysis may seem dull topics for a mathematician: they are
about super simple invariants characterized by say a word on n= 64 bits with very few bits at …
about super simple invariants characterized by say a word on n= 64 bits with very few bits at …
Adapting Rigidity to Symmetric Cryptography: Towards" Unswerving" Designs
O Dunkelman, L Perrin - Proceedings of the 5th ACM workshop on …, 2019 - dl.acm.org
While designers of cryptographic algorithms are rarely considered as potential adversaries,
past examples, such as the standardization of the Dual EC PRNG highlights that the story …
past examples, such as the standardization of the Dual EC PRNG highlights that the story …
Invariant hopping attacks on block ciphers
NT Courtois - arXiv preprint arXiv:2002.03212, 2020 - arxiv.org
Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to
numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is …
numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is …