2 research outputs found

    Weak Keys and Cryptanalysis of a Cold War Block Cipher

    Full text link
    T-310 is a cipher that was used for encryption of governmental communications in East Germany during the final years of the Cold War. Due to its complexity and the encryption process,there was no published attack for a period of more than 40 years until 2018 by Nicolas T. Courtois et al. in [10]. In this thesis we study the so called 'long term keys' that were used in the cipher, in order to expose weaknesses which will assist the design of various attacks on T-310

    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. 1 Arithmetic Correlations and Walsh Transforms

    No full text
    Abstract—In this paper the authors continue a program to find arithmetic, or “with-carry, ” analogs of polynomial based phenomena that appear in the design and analysis of cryptosystems and other branches of digital computation and communications. They construct arithmetic analogs of the Walsh-Hadamard transform and correlation functions of Boolean functions. These play central roles in the cryptographic analysis of block ciphers and stream ciphers. After making basic definitions and constructing various algebraic tools they: (1) show how to realize arithmetic correlations as cardinalities of intersections of hypersurfaces; (2) show that the arithmetic Walsh spectrum characterizes a Boolean function; (3) study the average behavior of arithmetic Walsh transforms; (4) find the arithmetic Walsh transforms of linear and affine functions. Index Terms—Walsh-Hadamard transform, correlation functions, p-adic numbers
    corecore