127
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

A nonlinear invariant attack on T-310 with the original Boolean function

Pages 178-192 | Published online: 23 Apr 2020
 

Abstract

There are numerous results on nonlinear invariant attacks on T-310. In all such attacks found so far, both the Boolean functions and the cipher wiring were contrived and chosen by the attacker. In this article, we show how to construct an invariant attack with the original Boolean function that was used to encrypt government communications in the 1980s.

About the author

Nicolas T. Courtois is a Senior Lecturer at University College London, where he teaches about applied cryptography and cryptanalysis. His research focuses on the security analysis of cryptographic systems with particular focus on realistic attack scenarios and systems used by millions of users every day. His Google Scholar profile lists more than 150 papers with 9,000 citations in cryptography. His H-index is 38. A university team lead by Nicolas Courtois was given the UK University Cipher Champion in March 2013. He is a founding member of the group Code-Breakers at LinkedIn and a member of the editorial board of Cryptologia. Previously, he was a crypto research engineer at Gemalto, the world's largest manufacturer of smart cards and secure hardware. He has filed more than ten patents on practical applications of cryptography. He is an expert on security engineering, electronic payment, and crypto currency. His blog is blog.bettercrypto.com.

Notes

1 This requires some complex technical conditions on the cipher wiring (Courtois and Oprisanu Citation2018)

2 This wiring is also called LZS or Langzeitschlüssel which means a long-term key.

3 Some earlier documents about these questions, about cipher designs called ALPHA, SKS and OPERATION cited in (Arbeitsgebiet Citation1976) are not available to us, cf. also (Courtois, Drobick, and Schmeh Citation2018).

4 For example we connect 2·3 inputs of D,C,B to the 6 inputs of W.

5 For example if one input A is b the other must be c.

6 For example we connect 2·3 inputs of H,G,F to the 6 inputs of Y.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 92.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.