Cryptanalysis of Akelarre 1 Description of Akelarre

Total Page:16

File Type:pdf, Size:1020Kb

Cryptanalysis of Akelarre 1 Description of Akelarre Cryptanalysis of Akelarre Niels Ferguson Bruce Schneier DigiCash bv Counterpane Systems Kruislaan 419 101 E Minnehaha Parkway 1098 VA Amsterdam, Netherlands Minneap olis, MN 55419, USA [email protected] [email protected] July 23, 1997 Abstract We showtwo practical attacks against the Akelarre blo ck cipher. The b est 42 attack retrieves the 128-bit key using less than 100 chosen plaintexts and 2 o -line trial encryptions. Our attacks use a weakness in the round function that preserves the parity of the input, a set of 1-round di erential character- istics with probability1, and the lackofavalanche and one-way prop erties in the key-schedule. We suggest some ways of xing these immediate weak- nesses, but conclude that the algorithm should be abandoned in favor of b etter-studied alternatives. 1 Description of Akelarre Akelarre [AGMP96A , AGMP96B ] is a 128-bit blo ck cipher that uses the same overall structure as idea [LMM91 ]; instead of idea's 16-bit sub-blo cks Akelarre uses 32-bit sub-blo cks. Furthermore, Akelarre do es not use mo dular multiplica- tions, but instead uses a combination of a 128-bit key-dep endent rotate at the b eginning of each round, and rep eated key additions and data-dep endent rota- 1 tions in its MA-b ox called an \addition-rotation structure" in Akelarre. Akelarre is de ned for a variable-length key and a variable numb er of rounds. The authors recommend using Akelarre with four rounds and a 128-bit key; this is the version that we will cryptanalyze. 1.1 Encryption An Akelarre encryption consists of an input transformation, a rep eated round function, and an output transformation see gure 1. The input transformation is de ned as follows: 1 Data-dep endent rotations were rst used by Madryga [Mad84 ] and more recently in RC5 [Riv95]. Figure 1: Overview of the Akelarre blo ck cipher 1 The 128-bit plaintext is divided into four 32-bit sub-blo cks: X , X , X , 1 2 3 and X . 4 2 These sub-blo cks are combined with four sub-keys all subkeys are de ned i th as Z , where i is the round and j indicates the j sub-key used in round i: j 0 0 32 R := X + Z mo d 2 1 1 1 0 0 R := X Z 2 2 2 0 0 R := X Z 3 3 3 0 0 32 R := X + Z mo d 2 4 4 4 These four sub-blo cks provide the input to round 1. Akelarre has v rounds. Each round i =1;::: ;v consists of the following steps: i1 i1 i1 i1 1 The four input sub-blo cks R , R , R , and R are concate- 1 2 3 4 nated into one 128-bit blo ck. 2 The 128-bit blo ck is rotated left a variable number of bits determined by i the least signi cant seven bits of Z . 1 i i 3 The rotated 128-bit blo ckis divided into four 32-bit sub-blo cks: S , S , 1 2 i i S , and S . 3 4 4 Pairs of sub-blo cks are xored to provide inputs to the addition-rotation structure: i i i P := S S 1 1 3 i i i P := S S 2 2 4 i i i i i and P are combined with twelve 32-bit sub-keys, Z ;Z ;::: ;Z , 5 P 1 2 2 3 13 according to the addition-rotation structure describ ed later. The output of i i this structure consists of two 32-bit sub-blo cks Q and Q . 1 2 6 The four sub-blo cks from Step 3 are xored with the outputs of the addition- rotation structure: i i i R := S Q 1 1 2 i i i R := S Q 2 2 1 i i i := S Q R 3 3 2 i i i R := S Q 4 4 1 i i The sub-blo cks R ;::: ;R form the output of the round function. 1 4 The output of the nal round forms the input to the output transformation, which consists of the following steps: th 1 The output blo cks of the v round are concatinated into one 128-bit blo ck. 2 The 128-bit blo ck is rotated left a variable number of bits determined by v +1 the least signi cant seven bits of Z . 1 v +1 v +1 3 The rotated 128-bit blo ck is divided into four sub-blo cks: S , S , 1 2 v +1 v +1 S , and S . 3 4 4 The four sub-blo cks are combined with four nal sub-keys: v +1 v +1 32 Y := S + Z mo d 2 1 1 2 v +1 v +1 Z Y := S 2 3 2 v +1 v +1 Y := S Z 3 3 4 v +1 v +1 32 mo d 2 + Z Y := S 4 5 4 5 The four sub-blo cks, Y , Y , Y , and Y are concatenated to form the cipher- 1 2 3 4 text. All that remains is to sp ecify the addition-rotation structure. We describ e this for completeness sake; our attack do es not rely on any prop ertyof the addition- i rotation structure. The structure is formed bytwo columns; P is the input to 1 i the rst column and P is the input to the second column. Each column works 2 as follows: i are rotated left a variable numb er of bits. 1 The high 31 bits of P j 2 The 32-bit output of the previous step is added to a sub-key. 3 The low 31 bits of the result of the previous step are rotated left a variable numb er of bits. 4 The 32-bit output of the previous step is added to a sub-key. 5 The high 31 bits of the result of the previous step are rotated left a variable numb er of bits. 6 The 32-bit output of the previous step is added to a sub-key. 7 Steps 3 through 6 are rep eated until there have b een seven rotations and six sub-key additions total. i i 8 The outputs of the two column are Q and Q . 1 2 Figure 2: Overview of the Akelarre key schedule i i i ; the sub-keys added ;::: Z ;Z The sub-keys added in the rst column are Z 13 9 8 i i i in the second column are Z ;Z ;::: ;Z . 2 3 7 Let X [a::b] b e the numb er formed by taking bits a through b from the integer X where we start our bit numb ering at 0 for the least signi cant bit. The rotation i amounts of the second column are determined by P : the rst rotation amount 1 i i is P [4::0], the second rotation amountisP [9::5], the third rotation amountis 1 1 i i P [14::10], the fourth rotation amount is P [19..15], the fth rotation amount 1 1 i i is P [23..20], the sixth rotation amountisP [27..24], and the seventh rotation 1 1 i [31::28]. The rotation amounts in the rst column are determined amountisP 1 i in the same manner from Q . 2 1.2 Key Schedule Akelarre requires 13v + 9 sub-keys four for the input transformation, 13 for each of the v rounds, and ve for the output transformation. These 32-bit sub-keys are derived from a master key. The length of the master key can b e anymultiple of 64 bits, although we limit our discussion to 128-bit master keys, which is the key size suggested in [AGMP96A ]. The description of the key schedule in [AGMP96A ] and [AGMP96B ] are di erent; we base our discussion on the more extensive description in [AGMP96A ]. An overview of the key schedule is shown in gure 2. First, the master key is divided into eight 16-bit sub-blo cks, called k for i = 1;::: ;8. Each sub-blo ck i 32 is squared yielding a 32-bit result, and then added mo d 2 to a constant, 1 2 32 A = A49ED284 and A = 735203DE . Let k := k + A mo d 2 and 0 1 0 16 16 i i 0 1 32 2 + A mo d 2 . k := k 1 i i 1 The rst eight sub-keys are generated as follows: The outermost bytes of k i 0 1 form the two high-order bytes of sub-key K ; the outermost bytes of k i i mo d 8+1 form the two low-order bytes of sub-key K . Thus, sub-key K is a function of i i only k and k . i i mo d 8+1 1 32 The innermost bytes of k are squared and added mo dulo 2 to A to generate 0 i 0 2 1 32 k , and similarly the innermost bytes of k are squared and added mo dulo 2 i i 0 2 to A to generate k . The second eight sub-keys are generated in the same way 0 i 2 the rst eight were. For i =9;::: ;16, the outermost bytes of k form the two i8 0 2 high-order bytes of sub-key K ; the outermost bytes of k form the two i i mo d 8+1 low-order bytes of sub-key K .
Recommended publications
  • US 2007/0043.668A1 Baxter Et Al
    US 2007.0043.668A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2007/0043.668A1 Baxter et al. (43) Pub. Date: Feb. 22, 2007 (54) METHODS AND SYSTEMS FOR Related U.S. Application Data NEGOTABLE-INSTRUMENT FRAUD PREVENTION (63) Continuation of application No. 10/371,984, filed on Feb. 20, 2003, now Pat. No. 7,072,868. (75) Inventors: Craig A. Baxter, Castle Rock, CO (US); John Charles Ciaccia, Parker, Publication Classification CO (US); Rodney J. Esch, Littleton, CO (US) (51) Int. Cl. G06Q 99/00 (2006.01) Correspondence Address: (52) U.S. Cl. ................................................................ 705/50 TOWNSEND AND TOWNSEND AND CREW, LLP (57) ABSTRACT TWO EMBARCADERO CENTER EIGHTH FLOOR SAN FRANCISCO, CA 94111-3834 (US) An authentication value is provided in a magnetic-ink field of a negotiable instrument. The authentication value is (73) Assignee: First Data Corporation, Greenwood derived from application of an encryption algorithm defined Village, CO (US) by a secure key. The authentication value may be used to authenticate the instrument through reapplication of the (21) Appl. No.: 11/481,062 encryption algorithm and comparing the result with the authentication value. The instrument is authenticated if there (22) Filed: Jul. 3, 2006 is a match between the two. 530 instrument Presented at Port of Sae instrument Conveyed to First Financial MCR line Scanned and instrument 534 Institution Authenticated at Point of Sale 538 Electronic Package Generated with MICR-Line Information andlor image 542 Electronic
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Analysis of Arx Round Functions in Secure Hash Functions
    ANALYSIS OF ARX ROUND FUNCTIONS IN SECURE HASH FUNCTIONS by Kerry A. McKay B.S. in Computer Science, May 2003, Worcester Polytechnic Institute M.S. in Computer Science, May 2005, Worcester Polytechnic Institute A Dissertation submitted to the Faculty of The School of Engineering and Applied Science of The George Washington University in partial satisfaction of the requirements for the degree of Doctor of Science May 15, 2011 Dissertation directed by Poorvi L. Vora Associate Professor of Computer Science The School of Engineering and Applied Science of The George Washington University certifies that Kerry A. McKay has passed the Final Examination for the degree of Doctor of Science as of March 25, 2011. This is the final and approved form of the dissertation. ANALYSIS OF ARX ROUND FUNCTIONS IN SECURE HASH FUNCTIONS Kerry A. McKay Dissertation Research Committee: Poorvi L. Vora, Associate Professor of Computer Science, Dissertation Director Gabriel Parmer, Assistant Professor of Computer Science, Committee Member Rahul Simha, Associate Professor of Engineering and Applied Science, Committee Member Abdou Youssef, Professor of Engineering and Applied Science, Committee Member Lily Chen, Mathematician, National Institute of Standards and Technology, Committee Member ii Dedication To my family and friends, for all of their encouragement and support. iii Acknowledgements This work was supported in part by the NSF Scholarship for Service Program, grant DUE-0621334, and NSF Award 0830576. I would like to thank my collaborators Niels Ferguson and Stefan Lucks for our collaborative research on the analysis of the CubeHash submission to the SHA-3 competition. I would also like to thank the entire Skein team for their support.
    [Show full text]
  • Bruce Schneier 2
    Committee on Energy and Commerce U.S. House of Representatives Witness Disclosure Requirement - "Truth in Testimony" Required by House Rule XI, Clause 2(g)(5) 1. Your Name: Bruce Schneier 2. Your Title: none 3. The Entity(ies) You are Representing: none 4. Are you testifying on behalf of the Federal, or a State or local Yes No government entity? X 5. Please list any Federal grants or contracts, or contracts or payments originating with a foreign government, that you or the entity(ies) you represent have received on or after January 1, 2015. Only grants, contracts, or payments related to the subject matter of the hearing must be listed. 6. Please attach your curriculum vitae to your completed disclosure form. Signatur Date: 31 October 2017 Bruce Schneier Background Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and the Tor Project, and an advisory board member of EPIC and VerifiedVoting.org. He is also a special advisor to IBM Security and the Chief Technology Officer of IBM Resilient.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Basque Mythology
    Center for Basque Studies Basque Classics Series, No. 3 Selected Writings of José Miguel de Barandiarán: Basque Prehistory and Ethnography Compiled and with an Introduction by Jesús Altuna Translated by Frederick H. Fornoff, Linda White, and Carys Evans-Corrales Center for Basque Studies University of Nevada, Reno Reno, Nevada This book was published with generous financial support obtained by the Association of Friends of the Center for Basque Studies from the Provincial Government of Bizkaia. Basque Classics Series, No. Series Editors: William A. Douglass, Gregorio Monreal, and Pello Salaburu Center for Basque Studies University of Nevada, Reno Reno, Nevada 89557 http://basque.unr.edu Copyright © by the Center for Basque Studies All rights reserved. Printed in the United States of America. Cover and series design © by Jose Luis Agote. Cover illustration: Josetxo Marin Library of Congress Cataloging-in-Publication Data Barandiarán, José Miguel de. [Selections. English. ] Selected writings of Jose Miguel de Barandiaran : Basque prehistory and ethnography / compiled and with an introduction by Jesus Altuna ; transla- tion by Frederick H. Fornoff, Linda White, and Carys Evans-Corrales. p. cm. -- (Basque classics series / Center for Basque Studies ; no. ) Summary: “Extracts from works by Basque ethnographer Barandiaran on Basque prehistory, mythology, magical beliefs, rural life, gender roles, and life events such as birth, marriage, and death, gleaned from interviews and excavations conducted in the rural Basque Country in the early to mid-twentieth century. Introduction includes biographical information on Barandiaran”--Provided by publisher. Includes bibliographical references and index. ISBN ---- (pbk.) -- ISBN ---- (hardcover) . Basques--Folklore. Mythology, Basque. Basques--Social life and cus- toms.
    [Show full text]
  • Foreword by Whitfield Diffie Preface About the Author Chapter 1
    Applied Cryptography: Second Edition - Bruce Schneier Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Bruce Schneier Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471128457 Pub Date: 01/01/96 Foreword By Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure of Secrets Page 1 of 666 Applied Cryptography: Second Edition - Bruce
    [Show full text]
  • Ontario Superior Court of Justice
    CourtFileNo.: CV-17- -OOCP ONTARIO SUPERIOR COURT OF JUSTICE MATTER OF a Proceeding under the Class Proceedings Act, 1992, S.O. 1992, C. 6 ARLENE MCDOWELL and BRYAN MADRYGA Plaintiffs - and- FORTRESS REAL CAPITAL INC., FORTRESS REAL DEVELOPMENTS INC., JAWAD RA TH ORE, VINCENZO PETROZZA, LAMB CALGARY INC., ORCHARD CALGARY INC., BUILDING & DEVELOPMENT MORTGAGES CANADA INC., ILDINA GALATI, FFM CAPITAL INC., ROSALIA SPADAFORA, KRISH KOCHHAR, TONY MAZZO LI, SAUL PERLOV, FMP MORTGAGE INVESTMENTS INC., MICHAEL DARAMOLA, TONINO AMENDOLA, GRAHAM MCWATERS, DEREK SORRENTI, GRANT MORGAN, SORRENTI LAW PROFESSIONAL CORPORATION, OLYMPIA TRUST COMPANY Defendants STATEMENT OF CLAIM TO THE DEFENDANT(S): A LEGAL PROCEEDING HAS BEEN COMMENCED AGAINST YOU by the Plaintiff. The Claim made against you is set out in the following pages. IF YOU WISH TO DEFEND THIS PROCEEDING, you or an Ontario lawyer acting for you must prepare a Statement of Defence in Form l 8A prescribed by the Rules of Civil Procedure, serve it on the Plaintiff lawyer or, where the Plaintiff do not have a lawyer, serve it on the Plaintiff, and file it, with proof of service, in this court office, WITHIN TWENTY DAYS after this Statement of Claim is served on you, if you are served in Ontario. If you are served in another province or territory of Canada or in the United States of America, the period for serving and filing your Statement of Defence is forty days. If you are served outside Canada and the United States of America, the period is sixty days. Instead of serving and filing a Statement of Defence, you may serve and file a Notice of Intent to Defend in Form 18B prescribed by the Rules of Civil Procedure.
    [Show full text]
  • Statistical Cryptanalysis of Block Ciphers
    STATISTICAL CRYPTANALYSIS OF BLOCK CIPHERS THÈSE NO 3179 (2005) PRÉSENTÉE À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS Institut de systèmes de communication SECTION DES SYSTÈMES DE COMMUNICATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pascal JUNOD ingénieur informaticien dilpômé EPF de nationalité suisse et originaire de Sainte-Croix (VD) acceptée sur proposition du jury: Prof. S. Vaudenay, directeur de thèse Prof. J. Massey, rapporteur Prof. W. Meier, rapporteur Prof. S. Morgenthaler, rapporteur Prof. J. Stern, rapporteur Lausanne, EPFL 2005 to Mimi and Chlo´e Acknowledgments First of all, I would like to warmly thank my supervisor, Prof. Serge Vaude- nay, for having given to me such a wonderful opportunity to perform research in a friendly environment, and for having been the perfect supervisor that every PhD would dream of. I am also very grateful to the president of the jury, Prof. Emre Telatar, and to the reviewers Prof. em. James L. Massey, Prof. Jacques Stern, Prof. Willi Meier, and Prof. Stephan Morgenthaler for having accepted to be part of the jury and for having invested such a lot of time for reviewing this thesis. I would like to express my gratitude to all my (former and current) col- leagues at LASEC for their support and for their friendship: Gildas Avoine, Thomas Baign`eres, Nenad Buncic, Brice Canvel, Martine Corval, Matthieu Finiasz, Yi Lu, Jean Monnerat, Philippe Oechslin, and John Pliam. With- out them, the EPFL (and the crypto) would not be so fun! Without their support, trust and encouragement, the last part of this thesis, FOX, would certainly not be born: I owe to MediaCrypt AG, espe- cially to Ralf Kastmann and Richard Straub many, many, many hours of interesting work.
    [Show full text]
  • Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-8S3, June 2019 Research Problems in Block Cipher Cryptanalysis: An Experimental Analysis Amandeep, G. Geetha Abstract: Cryptography has always been a very concerning Organization of this paper is as follows. Section 2 lists the issue in research related to digital security. The dynamic need of Block ciphers in a chronological order in a table having six applications and keeping online transactions secure have been columns stating name of the algorithm, year of publication, giving pathways to the need of developing different its cryptographic strategies. Though a number of cryptographic structure, block size, key size, and the cryptanalysis done on algorithms have been introduced till now, but each of these algorithms has its own disadvantages or weaknesses which are that particular cipher. This table becomes the basis of the identified by the process of cryptanalysis. This paper presents a analysis done in Section 3 and tabulates the information as to survey of different block ciphers and the results of attempts to which structure has been cryptanalyzed more, thereby identify their weakness. Depending upon the literature review, establishing a trend of structures analyzed Section 4 some open research problems are being presented which the identifies the open research problems based on the analysis cryptologists can depend on to work for bettering cyber security. done in Section 3. Section 5 of the paper, presents the conclusion of this study. Index Terms: block ciphers, cryptanalysis, attacks, SPN, Feistel. II. RELATED WORK I. INTRODUCTION This paper surveys 69 block ciphers and presents, in Cryptography is the science which deals with Table I, a summarized report as per the attacks concerned.
    [Show full text]
  • The Case of the “Big Seven” Basque Chefs
    Keys to success in an example of inter-competitor cooperation: The Case of the “Big Seven” Innobasque Case Studies Basque Chefs In collaboration with Authors María Soledad Aguirre: [email protected] Covadonga Aldamiz-Echevarría: [email protected] Gloria Aparicio: [email protected] Coordinators Idoia Bidaurrazaga: [email protected] Lola Elejalde: [email protected] Acknowledgements The authors would like to thank Juan Mari Arzak, Pedro Subijana, Karlos Arguiñano, Hilario Arbelaitz, Martín Berasategui, Andoni Luis Aduriz and Eneko Atxa for their help in preparing this case study and to Pedro J. Moreno and José Luis Galiana for providing photographic material. Published by: Innobasque - 2011 Basque Innovation Agency Parque Tecnológico de Bizkaia Laida Bidea, 203 48170 - Zamudio www.casosinnobasque.com ISBN: 978-84-96543-43-0 The contents of this book, in this edition, are published under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Spain licence (for more information, see http://creativecommons.org/licenses/by-nc-nd/3.0/deed.es_CO) The contents of this publication have been drawn up with the approval of Juan Mari Arzak, Pedro Subijana, Karlos Arguiñano, Hilario Arbelaitz, Martín Berasategui, Andoni Luis Aduriz and Eneko Atxa. Publication PMP Management Factory and layout: E-mail: [email protected] Website: www.pmp.es THE CASE OF T HE “BIG SEVEN ” BASQUE CHEFS 3 Contents Foreword 5 Introduction 7 1. The origins: the history of the formation of the Basque Chefs group 8 2. Current situation: from Basque “nouvelle cuisine” to Basque “haute cuisine” 12 3. Collaboration between Basque chefs and other agents: the extended value generation network 17 4.
    [Show full text]
  • I Bad Christians and Hanging Toads: Witch Trials In
    Bad Christians and Hanging Toads: Witch Trials in Early Modern Spain, 1525-1675 by Rochelle E. Rojas Department of History Duke University Date: _______________________ Approved: ___________________________ Thomas RoBisheaux, Supervisor ___________________________ John J. Martin ___________________________ Pete Sigal ___________________________ Allyson Creasman Dissertation suBmitted in partial fulfillment of the reQuirements for the degree of Doctor of Philosophy in the Department of History in the Graduate School of Duke University 2016 i v ABSTRACT Bad Christians and Hanging Toads: Witch Trials in Early Modern Spain, 1525-1675 by Rochelle E. Rojas Department of History Duke University Date: _______________________ Approved: ___________________________ Thomas RoBisheaux, Supervisor ___________________________ John J. Martin ___________________________ Pete Sigal ___________________________ Allyson Creasman An aBstract of a dissertation suBmitted in partial fulfillment of the reQuirements for the degree of Doctor of Philosophy, in the Department of History in the Graduate School of Duke University 2016 Copyright By Rochelle E. Rojas 2016 Abstract This dissertation challenges depictions of witchcraft as a sensational or disruptive phenomenon, presenting witch Beliefs instead as organically woven into everyday community life, religious Beliefs, and village culture. It argues that witch beliefs were adaptive, normal, and rational in regions that never suffered convulsive witch persecutions. Furthermore, this dissertation, the first to work systematically through Spanish secular court witch trials, upends scholars’ views aBout the dominance of the Spanish InQuisition in witchcraft prosecutions. Through a serial study of secular court records, this dissertation reveals that the local court of Navarra poached dozens of witch trials from the Spanish InQuisition, and independently prosecuted over one hundred accused witches over one hundred-and-fifty years.
    [Show full text]