#### Filter Results:

#### Publication Year

1995

2017

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

Matsui's linear cryptanalysis for iterated block ciphers is generalized by replacing his linear expressions with I/O sums. For a single round, an I/O sum is the XOR of a balanced binary-valued function of the round input and a balanced binary-valued function of the round output. The basic attack is described and conditions for it to be successful are given.… (More)

Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an eeective partition-pair, i.e., a partition of the plaintext set and a partition of the next-to-last-round output set such that, for every key, the next-to-last-round outputs are non-uniformly distributed… (More)

- Carlo Harpes
- 1996

— This paper illustrates the activities under development within the FP7 EU MICIE project. The project is devoted to design and implement an on-line alerting system, able to evaluate, in real time, the level of risk of interdependent Critical Infrastructures (CIs). Such a risk is generated by undesired events and by the high level of interconnection of the… (More)

The paper presents a general setting which is used to describe generalized linear and partitioning cryptanalysis. A measure of non-uniformity called imbalance similar to Matsui's bias is deened. Some upper bounds for this measure are presented and used to estimate a cipher's resistance to each of the two attacks. The bounds reveal that there exists a uniied… (More)

- Benoît Jager, Carlo Harpes
- 2009

Benoît Jager is junior security IT consultant at itrust consulting s.à r.l. since one year, working almost full time on the ESA project " Developing a proof of location for Galileo ". He has a Master in Brian Gent (NSN) joined Nokia Siemens Networks SA (then named Siemens SA) in July 2006 and assumed the role of CSI (consulting & systems integration)… (More)

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS… (More)

- Carlo Harpes
- 1995

It is shown that the cipher SAFER, after only three of the suggested six rounds, is secure against the procedure for nding eeective homomorphic I/O sums used in a generalization of linear cryptanalysis. SAFER is a 64-bit block cipher, introduced by J. L. Massey in 1993 Mas94]. For this cipher, we will use the convention that bytes, i.e., 8-bit tuples, are… (More)