Results 111 to 120 of about 38,531 (142)

Improving the higher order differential attack and cryptanalysis of the KN cipher [PDF]

open access: closedISW, 1998
Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalyses have been studied for many cryptosystems. Moreover, some block ciphers with provable security against differential and linear cryptanalysis have been proposed.
Takeshi Shimoyama   +2 more
semanticscholar   +4 more sources

Higher order differential cryptanalysis framework and its applications

open access: closedInternational Conference on Information Science and Technology, 2011
In this paper, we introduce a higher order differential cryptanalysis framework based on higher order derivatives. We show the previous attacks, higher order differential attack(HODA), algebraic IV differential attack(AIDA), Cube Attack, Cube Tester and bitwise higher order differential attack(BHODA) are all theoretically based on higher order ...
Ming Duan, Xuejia Lai
semanticscholar   +4 more sources

On MISTY1 Higher Order Differential Cryptanalysis

open access: closedInternational Conference on Information Security and Cryptology, 2001
MISTY1 is a block cipher whose design relies on an assertion of provable security against linear and differential cryptanalysis. Yet, a simplified and round reduced version of MISTY1 that does not alter the security provability can be attacked with higher order differential cryptanalysis.
Steve Babbage, Laurent Frisch
semanticscholar   +4 more sources

Bitwise Higher Order Differential Cryptanalysis

open access: closedInternational Conference on Trusted Systems, 2010
This paper attempts to utilize the ideas of higher order differential cryptanalysis to investigate Boolean algebra based block ciphers. The theoretical foundation is built for later research, and two kinds of distinguishing attacks are proposed. The prerequisites of the attacks are also presented and proved, and an efficient algorithm is introduced to ...
Kefei Chen, Bo Zhu, Xuejia Lai
semanticscholar   +4 more sources

Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property

open access: closedMathematical Methods, Models, and Architectures for Network Security Systems, 2003
In this paper, we find linear equations of SPECTR-H64 using the property of controlled permutation boxes. Also, we construct the fourth-order differential structure using the property that the algebraic degree of the function G is 3, which is the only non-linear part of SPECTR-H64. These linear equations and structures enable us to attack the reduced 6
Sangjin Lee   +4 more
semanticscholar   +4 more sources

Higher Order Derivatives and Differential Cryptanalysis

open access: closed, 1994
High-order derivatives of multi-variable functions are studied in this paper as a natural generalization of the basic concept used in differential cryptanalysis. Possible applications of such derivatives in cryptology are discussed.
Xuejia Lai
semanticscholar   +4 more sources

A New Higher Order Differential of RAGHAV

2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW), 2022
RAGHAV is a 64-bit block cipher proposed by Bansod in 2021. It supports 80-, and 128-bit secret keys. The designer evaluated its security against typical attack, such as differential cryptanalysis, linear cryptanalysis, and so on.
Naoki Shibayama, Y. Igarashi
semanticscholar   +1 more source

A New Higher Order Differential of Enocoro-128v2

2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW), 2021
This paper reports the strength of a pseudorandom number generator Enocoro-128v2, which was published as a stream cipher by Hitachi, Ltd. in 2010, against higher order differential cryptanalysis.
Naoki Shibayama, Y. Igarashi
semanticscholar   +1 more source

Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECK

Conference on Privacy, Security and Trust, 2023
The research on combining cryptanalysis with deep learning has recently attracted increasing attention. As an ultra-lightweight cipher for IoT environments, SPECK has attracted much attention from researchers for its excellent performance, and there have
Haoran Deng, Xianghui Cao, Yu Cheng
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy