Overview
Explore the intricacies of cryptanalysis and collision attacks in this 27-minute conference talk from FSE 2013. Delve into David McGrew's presentation on impossible plaintext cryptanalysis and probable plaintext collision attacks of 64-bit block ciphers. Examine topics such as simple models, Bayesian analysis, expected number of blocks, and real-world implications. Investigate leaks, counter mode, and multiple known plaintext scenarios. Gain insights into more sophisticated models, target values, and reasonable attack practices. Conclude with a discussion on hybrid approaches and key takeaways in the field of cryptography and information security.
Syllabus
Outline
Simple model
Indicator
Indistinct
Bayesian analysis
What does it work
Expected number of blocks
Loglog plot
Real world
Leaks
Limit number of blocks
Counter mode
Multiple known plaintext
Capital epsilon
More sophisticated model
Target values
Repeated values
Repeated target values
Reasonable attack
Practice
Hybrid
Conclusions
Taught by
TheIACR