Security of a Wide Trail Design
نویسندگان
چکیده
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential cryptanalysis. Rijndael, the AES, was designed along the principles of this strategy. We survey the recent results on Rijndael and examine whether the design strategy has fulfilled its promise.
منابع مشابه
Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملInspect: a Lightweight Distributed Approach to Automated Audit Trail Analysis
Security is a key issue in the design and implementation of complex information systems. Security mechanisms and policies have to be deployed and then continuously maintained, monitored and audited. Auditing information is of great usefulness, but diicult to manage. Thus, several tools for security audit trail analysis have been developed to assist audit trails analysts in their work. Great eeo...
متن کاملThe Wide Trail Design Strategy
We explain the theoretical background of the wide trail design strategy, which was used to design Rijndael, the Advanced Encryption Standard (AES). In order to facilitate the discussion, we introduce our own notation to describe differential and linear cryptanalysis. We present a block cipher structure and prove bounds on the resistance against differential and linear cryptanalysis.
متن کاملSecure Computation of k-Anonymous Distributed Data
In a distributed environment, such as the World Wide Web, an individual leaves behind personal data at many different locations. To protect the privacy of an individual’s sensitive information, locations make separate releases of identifiable data (e.g. name or social security number), and sensitive data (e.g. visitor’s IP address). To the releasing location the data appears unlinkable, however...
متن کاملنقش شورای امنیت در تحقق عدالت کیفری بین المللی
Relationship between the UN Security Council, the institution of international criminal justice demonstrates a deep relationship between peace and justice. Therefore by ratification of statute of international criminal court, in different cases we can see the roles of UN Security Council in prosecute, trail and punishment those who commit the crimes within the jurisdiction of international cr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002