{"id":"https://openalex.org/W1651602301","doi":"https://doi.org/10.5075/epfl-thesis-6651","title":"Algebraic Cryptanalysis of Deterministic Symmetric Encryption","display_name":"Algebraic Cryptanalysis of Deterministic Symmetric Encryption","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W1651602301","doi":"https://doi.org/10.5075/epfl-thesis-6651","mag":"1651602301"},"language":"en","primary_location":{"id":"pmh:oai:infoscience.tind.io:210605","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/117127","pdf_url":"https://infoscience.epfl.ch/record/210605/files/EPFL_TH6651.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://infoscience.epfl.ch/record/210605/files/EPFL_TH6651.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078991789","display_name":"Petr Su\u0161il","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Su\u0161il, Petr","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5078991789"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.7264132499694824},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.6768652200698853},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6711100935935974},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6510277390480042},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5629993081092834},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4835319519042969},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47114887833595276},{"id":"https://openalex.org/keywords/gr\u00f6bner-basis","display_name":"Gr\u00f6bner basis","score":0.46844226121902466},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.46237441897392273},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.42941394448280334},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42234572768211365},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3765203654766083},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35610002279281616},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3158359229564667},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.2932807207107544},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.16946858167648315},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.11852529644966125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.058717966079711914}],"concepts":[{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.7264132499694824},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.6768652200698853},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6711100935935974},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6510277390480042},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5629993081092834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4835319519042969},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47114887833595276},{"id":"https://openalex.org/C198082693","wikidata":"https://www.wikidata.org/wiki/Q1551631","display_name":"Gr\u00f6bner basis","level":3,"score":0.46844226121902466},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.46237441897392273},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.42941394448280334},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42234572768211365},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3765203654766083},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35610002279281616},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3158359229564667},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.2932807207107544},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.16946858167648315},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.11852529644966125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.058717966079711914}],"mesh":[],"locations_count":4,"locations":[{"id":"pmh:oai:infoscience.tind.io:210605","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/117127","pdf_url":"https://infoscience.epfl.ch/record/210605/files/EPFL_TH6651.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},{"id":"pmh:oai:infoscience.epfl.ch:210605","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/210605","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"doi:10.5075/epfl-thesis-6651","is_oa":true,"landing_page_url":"https://doi.org/10.5075/epfl-thesis-6651","pdf_url":null,"source":{"id":"https://openalex.org/S4306400488","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"},{"id":"mag:1651602301","is_oa":false,"landing_page_url":"https://infoscience.epfl.ch/record/210605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:infoscience.tind.io:210605","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/117127","pdf_url":"https://infoscience.epfl.ch/record/210605/files/EPFL_TH6651.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2874399266","display_name":"Rekonstruktion von Klimaschwankungen durch die Analyse von Eisbohrkernen","funder_award_id":"34860","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"},{"id":"https://openalex.org/G4836148144","display_name":null,"funder_award_id":"20002","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"},{"id":"https://openalex.org/G6047882774","display_name":"Cryptanalysis and Design of Ultra-lightweight Cryptographic Primitives","funder_award_id":"134860","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"},{"id":"https://openalex.org/G993971353","display_name":null,"funder_award_id":"200021","funder_id":"https://openalex.org/F4320320924","funder_display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320924","display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","ror":"https://ror.org/00yjd3n13"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1651602301.pdf","grobid_xml":"https://content.openalex.org/works/W1651602301.grobid-xml"},"referenced_works_count":88,"referenced_works":["https://openalex.org/W1699105","https://openalex.org/W2728692","https://openalex.org/W45372631","https://openalex.org/W68643468","https://openalex.org/W97949831","https://openalex.org/W126716012","https://openalex.org/W604560364","https://openalex.org/W1467319789","https://openalex.org/W1480291365","https://openalex.org/W1480389758","https://openalex.org/W1489769990","https://openalex.org/W1489792672","https://openalex.org/W1497271730","https://openalex.org/W1509491396","https://openalex.org/W1512302998","https://openalex.org/W1515602789","https://openalex.org/W1515955908","https://openalex.org/W1516674193","https://openalex.org/W1520260307","https://openalex.org/W1542020576","https://openalex.org/W1544864119","https://openalex.org/W1545730607","https://openalex.org/W1549055687","https://openalex.org/W1550744730","https://openalex.org/W1553753418","https://openalex.org/W1560023496","https://openalex.org/W1562334123","https://openalex.org/W1563427558","https://openalex.org/W1572300106","https://openalex.org/W1573095851","https://openalex.org/W1578155860","https://openalex.org/W1583871653","https://openalex.org/W1588122562","https://openalex.org/W1588259322","https://openalex.org/W1599572980","https://openalex.org/W1629301835","https://openalex.org/W1665173307","https://openalex.org/W1768233326","https://openalex.org/W1778915605","https://openalex.org/W1784049852","https://openalex.org/W1831008849","https://openalex.org/W1850083534","https://openalex.org/W1870923733","https://openalex.org/W1934698557","https://openalex.org/W1952485798","https://openalex.org/W1974527567","https://openalex.org/W1993995116","https://openalex.org/W2000947838","https://openalex.org/W2004746351","https://openalex.org/W2006504364","https://openalex.org/W2016265800","https://openalex.org/W2018005057","https://openalex.org/W2038345254","https://openalex.org/W2039024443","https://openalex.org/W2062777165","https://openalex.org/W2074305260","https://openalex.org/W2076397729","https://openalex.org/W2085482277","https://openalex.org/W2095823805","https://openalex.org/W2100408583","https://openalex.org/W2107762801","https://openalex.org/W2109394932","https://openalex.org/W2113956615","https://openalex.org/W2114364776","https://openalex.org/W2124509406","https://openalex.org/W2128687423","https://openalex.org/W2131719221","https://openalex.org/W2137378957","https://openalex.org/W2160494425","https://openalex.org/W2164455525","https://openalex.org/W2165822414","https://openalex.org/W2234576048","https://openalex.org/W2238531909","https://openalex.org/W2397768959","https://openalex.org/W2398676181","https://openalex.org/W2399731424","https://openalex.org/W2401562438","https://openalex.org/W2401792959","https://openalex.org/W2403571297","https://openalex.org/W2403780381","https://openalex.org/W2519460876","https://openalex.org/W2615409614","https://openalex.org/W2660688569","https://openalex.org/W2949217259","https://openalex.org/W2949322661","https://openalex.org/W2950776902","https://openalex.org/W3030617795","https://openalex.org/W3030624396"],"related_works":["https://openalex.org/W1990042618","https://openalex.org/W2284116714","https://openalex.org/W3210635633","https://openalex.org/W830471359","https://openalex.org/W2370395125","https://openalex.org/W3131193102","https://openalex.org/W1974690417","https://openalex.org/W2939974597","https://openalex.org/W1589955734","https://openalex.org/W2922073470","https://openalex.org/W3029850225","https://openalex.org/W2712696683","https://openalex.org/W134094991","https://openalex.org/W2733546301","https://openalex.org/W21365499","https://openalex.org/W136912419","https://openalex.org/W3036908495","https://openalex.org/W2519872276","https://openalex.org/W144022960","https://openalex.org/W1956144568"],"abstract_inverted_index":{"Deterministic":[0],"symmetric":[1],"encryption":[2],"is":[3,18,23,36,55,112,151,205],"widely":[4],"used":[5,103],"in":[6,59,104,155,217],"many":[7],"cryptographic":[8],"applications.":[9],"The":[10,107],"security":[11,43],"of":[12,51,69,96,109,119,127,140,169],"deterministic":[13],"block":[14],"and":[15,31,93,130,221,252],"stream":[16],"ciphers":[17],"evaluated":[19],"using":[20],"cryptanalysis.":[21,33,157],"Cryptanalysis":[22],"divided":[24],"into":[25],"two":[26],"main":[27],"categories:":[28],"statistical":[29,80],"cryptanalysis":[30,35,64,194],"algebraic":[32,83,121,156,174,193,263],"Statistical":[34],"a":[37,48,66,87,94,135,152,163,245,256],"powerful":[38],"tool":[39],"for":[40,138,171,192,240,260],"evaluating":[41],"the":[42,73,91,100,105,117,225,230],"but":[44,72],"it":[45],"often":[46,76],"requires":[47,65],"large":[49],"number":[50,68,126],"plaintext/ciphertext":[52,70,128],"pairs":[53,71,129],"which":[54,150,172,195],"not":[56],"always":[57],"available":[58],"real":[60],"life":[61],"scenario.":[62],"Algebraic":[63],"smaller":[67],"attacks":[74,161],"are":[75,184,236],"underestimated":[77],"compared":[78],"to":[79,125,166,198,228,255],"methods.":[81],"In":[82],"cryptanalysis,":[84],"we":[85,115,188],"consider":[86],"polynomial":[88,242],"system":[89,98,243],"representing":[90,244],"cipher":[92],"solution":[95],"this":[97,110,144],"reveals":[99],"secret":[101],"key":[102],"encryption.":[106],"contribution":[108],"thesis":[111],"twofold.":[113],"Firstly,":[114],"evaluate":[116],"performance":[118],"existing":[120,200],"techniques":[122,180],"with":[123],"respect":[124],"their":[131],"selection.":[132],"We":[133,142,158],"introduce":[134],"new":[136],"strategy":[137,145],"selection":[139],"samples.":[141],"build":[143],"based":[146],"on":[147],"cube":[148,160],"attacks,":[149],"well-known":[153],"technique":[154,191],"use":[159],"as":[162,177,238],"fast":[164],"heuristic":[165],"determine":[167],"sets":[168],"plaintexts":[170],"standard":[173],"methods,":[175],"such":[176],"Groebner":[178,201,218],"basis":[179,202,219],"or":[181],"SAT":[182,222],"solvers,":[183],"more":[185],"efficient.":[186],"Secondly,":[187],"develop":[189],"a~new":[190],"allows":[196],"us":[197],"speed-up":[199],"techniques.":[203],"This":[204],"achieved":[206],"by":[207],"efficient":[208],"finding":[209],"special":[210],"polynomials":[211],"called":[212],"mutants.":[213],"Using":[214],"these":[215],"mutants":[216],"computations":[220],"solvers":[223],"reduces":[224],"computational":[226],"cost":[227],"solve":[229],"system.":[231],"Hence,":[232],"both":[233],"our":[234],"methods":[235],"designed":[237],"tools":[239,248],"building":[241],"cipher.":[246],"Both":[247],"can":[249],"be":[250],"combined":[251],"they":[253],"lead":[254],"significant":[257],"speedup,":[258],"even":[259],"very":[261],"simple":[262],"solvers.":[264]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
