[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 14, Issue 1 (9-2025) ::
منادی 2025, 14(1): 1-18 Back to browse issues page
Cryptanalysis of Modular Operations
Marzieh Vahid Dastjerdi *1 , Majid Rahimi1
1- Cryptography and Data Security Group, Reserch Center for Development of Advanced Technologies, Tehran, Iran
Abstract:   (398 Views)
The objective of this paper is to analyze and evaluate the behaviour of modular addition and subtraction in symmetric cipher attacks. Modular addition is one of the most widely used nonlinear operators in symmetric cryptographic algorithms. In ARX symmetric algorithms, only three operators are utilized: modular addition, rotation, and XOR. In ARX-like algorithms, modular subtraction or a substitution box is employed, in addition to the standard ARX operations. Since modular subtraction exhibits similar behaviour to modular addition, its behaviour against cryptanalytic attacks has not been explicitly studied in the literature. Therefore, this paper aims to provide a comprehensive overview of the behaviour of modular addition and subtraction in differential, linear, integral cryptanalysis based on division property, and rotational attacks, using both manual analysis and automated methods via MILP (Mixed-Integer Linear Programming). We demonstrate that there is no difference between modular addition and subtraction in differential, linear, and rotational cryptanalysis. However, in integral cryptanalysis based on the division property, these two operations behave differently.
Keywords: Cryptography, Symmetric Algorithms, Cryptanalysis Attacks, Modular Operations, MILP Method
Full-Text [PDF 2267 kb]   (225 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2024/09/9 | Accepted: 2025/01/4 | Published: 2025/04/30
Send email to the article author

Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Vahid Dastjerdi M, Rahimi M. Cryptanalysis of Modular Operations. منادی 2025; 14 (1) :1-18
URL: http://monadi.isc.org.ir/article-1-284-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 14, Issue 1 (9-2025) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.08 seconds with 39 queries by YEKTAWEB 4710