Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter March 10, 2010

Algebraic Attacks Galore!

  • Martin Kreuzer

This is the first in a two-part survey of current techniques in algebraic cryptanalysis. After introducing the basic setup of algebraic attacks and discussing several attack scenarios for symmetric cryptosystems, public key cryptosystems, and stream ciphers, we discuss a number of individual methods. The XL, XSL, and MutantXL attacks are based on linearization techniques for multivariate polynomial systems. Then we look at Gröbner basis and border bases methods. In the last section we introduce attacks based on integer programming techniques and try them in some concrete cases.

Received: 2009-05-15
Published Online: 2010-03-10
Published in Print: 2009-October

© Heldermann Verlag

Downloaded on 26.4.2024 from https://www.degruyter.com/document/doi/10.1515/GCC.2009.231/html
Scroll to top button