Differential Cryptanalysis of New Qamal Encryption Algorithm

نویسندگان

چکیده

Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One candidates role Qamal encryption algorithm developed by Institute Information and Computer Technologies (Almaty, Kazakhstan). The article describes algorithm. Differential properties main operations that make up cypher are considered in questions stability. We have shown version with 128-bit block same secret key size three rounds it difficult to find right pairs texts probability 2 –120 , which makes differential cryptanalysis not applicable

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

Differential Cryptanalysis of the ICE Encryption Algorithm

ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against differential and linear cryptanalysis. In this paper we will show however that we can use low Hamming weighted differences to perform a practical, key dependent, differential attack on ICE. The main conclusion is that...

متن کامل

Diierential Cryptanalysis of the Ice Encryption Algorithm

ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against diierential and linear cryptanalysis. In this paper we will show however that we can use low Hamming weighted diierences to perform a practical, key dependent , diierential attack on ICE. The main conclusion is that t...

متن کامل

Cryptanalysis of the Seal Encryption Algorithm

SEAL was rst introduced in 1] by Rogaway and Copper-smith as a fast software-oriented encryption algorithm. It is a pseu-dorandom function which stretches a short index into a much longer pseudorandom string under control of a secret key pre-processed into internal tables. In this paper we rst describe an attack of a simpliied version of SEAL, which provides large parts of the secret tables fro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electronics and Telecommunications

سال: 2023

ISSN: ['2300-1933', '2081-8491']

DOI: https://doi.org/10.24425/ijet.2020.134023