Skip to main content

Showing 1–4 of 4 results for author: Rimoldi, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1105.0259  [pdf, ps, other

    cs.CR cs.IT math.CO

    On the provable security of BEAR and LION schemes

    Authors: Lara Maines, Matteo Piva, Anna Rimoldi, Massimiliano Sala

    Abstract: BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function. Good properties of the primitives ensure good properties of the block cipher. In particular, they are able to p… ▽ More

    Submitted 2 May, 2011; originally announced May 2011.

    Journal ref: Applicable Algebra in Engineering, Communication and Computing, 2011, vol. 22, p. 413-423

  2. arXiv:1102.3882  [pdf, ps, other

    cs.CR math.CO

    On weakly APN functions and 4-bit S-Boxes

    Authors: Claudio Fontanari, Valentina Pulice, Anna Rimoldi, Massimiliano Sala

    Abstract: S-Boxes are important security components of block ciphers. We provide theoretical results on necessary or sufficient criteria for an (invertible) 4-bit S-Box to be weakly APN. Thanks to a classification of 4-bit invertible S-Boxes achieved independently by De CanniƩre and Leander-Poschmann, we can strengthen our results with a computer-aided proof.

    Submitted 2 August, 2011; v1 submitted 17 February, 2011; originally announced February 2011.

    Journal ref: Finite Fields and their Applications, 2012, vol. 18, p. 522-528

  3. arXiv:1011.2644  [pdf, ps, other

    cs.IT cs.CR

    Do AES encryptions act randomly?

    Authors: Anna Rimoldi, Massimiliano Sala, Enrico Bertolazzi

    Abstract: The Advanced Encryption Standard (AES) is widely recognized as the most important block cipher in common use nowadays. This high assurance in AES is given by its resistance to ten years of extensive cryptanalysis, that has shown no weakness, not even any deviation from the statistical behaviour expected from a random permutation. Only reduced versions of the ciphers have been broken, but they are… ▽ More

    Submitted 11 November, 2010; originally announced November 2010.

    Comments: 15 pages

  4. arXiv:1006.5894  [pdf, ps, other

    cs.IT cs.CR

    A possible intrinsic weakness of AES and other cryptosystems

    Authors: Anna Rimoldi, Massimiliano Sala, Ilia Toli

    Abstract: It has been suggested that the algebraic structure of AES (and other similar block ciphers) could lead to a weakness exploitable in new attacks. In this paper, we use the algebraic structure of AES-like ciphers to construct a cipher embedding where the ciphers may lose their non-linearity. We show some examples and we discuss the limitations of our approach.

    Submitted 11 November, 2010; v1 submitted 30 June, 2010; originally announced June 2010.

    Comments: 46 pages- updated bibliography and fixed minor problems