• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • ERA-NET TRANSCAN
        • Alternative Methods to Animal Testing
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol–South Tyrol–Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

Cryptoanalysis by means of numerical methods

Cryptoanalysis by means of numerical methods

Vincent Rijmen (ORCID: 0000-0001-7401-2088)
  • Grant DOI 10.55776/P19863
  • Funding program Principal Investigator Projects
  • Status ended
  • Start October 1, 2007
  • End December 31, 2009
  • Funding amount € 175,665

Disciplines

Computer Sciences (50%); Mathematics (50%)

Keywords

    Cryptoanalysis, Hash Functions, Optimization, Stream Ciphers

Abstract Final report

The transition to the electronic world raises increasing challenges for privacy, security, financial regulation, and intellectual property. Security in the electronic can be ensured only by using cryptographic operations like encryption, authentication and hashing. Due to the rapid evolutions in computing technology, old cryptography outdates quickly and new demands arise all the time. Hence the need for continuous evaluation of the security of existing techniques and creation of new cryptographic techniques. Symmetric algorithms are the workhorses of cryptography. There are no symmetric algorithms that come with a formal proof of security, hence continuous evaluation is a necessity. In the early 1990`s first Biham and Shamir, and later Matsui published two general techniques to cryptanalyze mainly symmetric, cryptographic algorithms. These techniques have been used with great success to break ---at least in an academic sense--- many existing ciphers, including the Data Encryption Standard (DES). For the next 10 years, researchers have been studying, applying and generalizing these cryptanalysis methods. Furthermore, several design strategies have been proposed in order to create ciphers that resist these attacks. Nowadays, mandatory requirements for new cipher proposals are that they are backed up by an analysis of the resistance of the proposed cipher against at least the basic forms of linear and differential cryptanalysis. Although there has been significant progress in the construction of symmetric cryptographic algorithms which can be proven to be secure against several types of attacks, general proofs of security can still not be given. Hence, this research field progresses by designing ciphers which are secure against known attacks and by subjecting them constantly to new methods of analysis. The primary goal of this project is to apply numerical solving methods in the cryptanalysis of symmetric cryptographic primitives. We will study whether numerical methods can be used with success to improve existing cryptanalytic attacks and as a new method for cryptanalysis in its own right. The target cryptographic algorithms of our analysis will be hash functions and stream ciphers. We anticipate that the application of numerical solvers may lead to new insights in the structure of the cryptographic algorithm under investigation. Finally, this research will lead to the definition of new design criteria, which improve resistance against this type of attacks.

The transition to the electronic world raises increasing challenges for privacy, security, financial regulation, and intellectual property. Security in the electronic can be ensured only by using cryptographic operations like encryption, authentication and hashing. Due to the rapid evolutions in computing technology, old cryptography outdates quickly and new demands arise all the time. Hence the need for continuous evaluation of the security of existing techniques and creation of new cryptographic techniques. Symmetric algorithms are the workhorses of cryptography. There are no symmetric algorithms that come with a formal proof of security, hence continuous evaluation is a necessity. In the early 1990`s first Biham and Shamir, and later Matsui published two general techniques to cryptanalyze mainly symmetric, cryptographic algorithms. These techniques have been used with great success to break - at least in an academic sense - many existing ciphers, including the Data Encryption Standard (DES). For the next 10 years, researchers have been studying, applying and generalizing these cryptanalysis methods. Furthermore, several design strategies have been proposed in order to create ciphers that resist these attacks. Nowadays, mandatory requirements for new cipher proposals are that they are backed up by an analysis of the resistance of the proposed cipher against at least the basic forms of linear and differential cryptanalysis. Although there has been significant progress in the construction of symmetric cryptographic algorithms which can be proven to be secure against several types of attacks, general proofs of security can still not be given. Hence, this research field progresses by designing ciphers which are secure against known attacks and by subjecting them constantly to new methods of analysis. The primary goal of this project is to apply numerical solving methods in the cryptanalysis of symmetric cryptographic primitives. We will study whether numerical methods can be used with success to improve existing cryptanalytic attacks and as a new method for cryptanalysis in its own right. The target cryptographic algorithms of our analysis will be hash functions and stream ciphers. We anticipate that the application of numerical solvers may lead to new insights in the structure of the cryptographic algorithm under investigation. Finally, this research will lead to the definition of new design criteria, which improve resistance against this type of attacks.

Research institution(s)
  • Technische Universität Graz - 100%
International project participants
  • Lars Knudsen, Technical University of Denmark - Denmark

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF