Results 71 to 80 of about 721 (175)

Algebraic Techniques in Linear Cryptanalysis

open access: yesProceedings of the 2012 2nd International Conference on Computer and Information Applications (ICCIA 2012), 2012
Linear cryptanalysis is a statistical analysis method. Linear cryptanalysis constructs probabilistic patterns first and then distinguishes the cipher from a random permutation using lots of plaintext-ciphertext pairs. Linear cryptanalysis has a big data complexity. Algebraic attack attempts to exploit the algebraic structure of the cipher by expressing
Hong Ru Wei, Ya Fei Zheng
openaire   +2 more sources

Security against differential and linear cryptanalysis for general SPT models

open access: yesTongxin xuebao, 2012
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU   +4 more
doaj   +2 more sources

Improved Slender-Set Linear Cryptanalysis [PDF]

open access: yes, 2015
In 2013, Borghoff et al. introduced a slender-set linear cryptanalysis on PRESENT-like ciphers with key-dependent secret S-boxes. In this paper, we propose an improved slender-set linear attack to PRESENT-like ciphers with secret S-boxes. We investigate three new cryptanalytic techniques, and use them to recover the secret S-boxes efficiently.
Guo-Qiang Liu, Chen-Hui Jin, Chuan-Da Qi
openaire   +1 more source

Differential-Linear Cryptanalysis of Serpent [PDF]

open access: yes, 2003
Serpent is a 128-bit SP-Network block cipher consisting of 32 rounds with variable key length (up to 256 bits long). It was selected as one of the 5 AES finalists. The best known attack so far is a linear attack on an 11-round reduced variant.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

open access: yesCybernetics and Information Technologies, 2016
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate nonsingular linear encodings of the output of the individual S-boxes.
Borissov Yuri   +2 more
doaj   +1 more source

Revisiting the shuffle of generalized Feistel structure

open access: yesCybersecurity
The Generalized Feistel Structure ( $$\texttt{GFS}$$ GFS ) is one of the most widely used frameworks in symmetric cipher design. In FES 2010, Suzaki and Minematsu strengthened the cryptanalysis security of $$\texttt{GFS}$$ GFS by searching for shuffles ...
Yincen Chen   +4 more
doaj   +1 more source

Probability distributions of correlation and differentials in block ciphers

open access: yesJournal of Mathematical Cryptology, 2007
We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given dimensions, for several of them for the first time.
Daemen Joan, Rijmen Vincent
doaj   +1 more source

Differential-Linear Cryptanalysis of Reduced Round ChaCha

open access: yesIACR Transactions on Symmetric Cryptology
ChaCha is a well-known stream cipher that has been used in many network protocols and software. In this paper, we study the security of reduced round ChaCha. First, by considering the differential-linear hull effect, we improve the correlation of a four-
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
doaj   +1 more source

New Linear Trails and Linear Hulls of CHAM

open access: yesIEEE Access
CHAM is a family of lightweight block ciphers with block sizes of 64 bits and 128 bits. CHAM performs very well in lightweight environments and is known to be one of the block ciphers that can be implemented with the smallest hardware area. In this paper,
Dongyoung Roh
doaj   +1 more source

Linear cryptanalysis of stream ciphers [PDF]

open access: yes, 1995
Starting from recent results on a linear statistical weakness of keystream generators and on linear correlation properties of combiners with memory, linear cryptanalysis of stream ciphers based on the linear sequential circuit approximation of finite-state machines is introduced as a general method for assessing the strength of stream ciphers.
openaire   +1 more source

Home - About - Disclaimer - Privacy