A note on the Edon80 S-box
نویسنده
چکیده
Edon80 [1] is one of the Phase 3 candidates in eSTREAM, the ECRYPT stream cipher project. This note examines the structure of the Edon80 quasigroup permutation, when viewed as an S-box or a pair of boolean functions. Although some interesting relations are found, we have not been able to apply these to attack the full cipher.
منابع مشابه
A Note on Algebraic Properties of Quasigroups in Edon80
Stream cipher Edon80 [6] is one of the submissions to the ECRYPT Stream Cipher Project eSTREAM that passed to the Phase II of this project. The core of this cipher is based on pipelined quasigroup transformations using the so called e-transformers [6]. We study algebraic properties of the suggested quasigroups for use in the stream cipher Edon80 and prove that all the suggested quasigroups for ...
متن کاملUnderstanding Periods in Edon80 - Response on Remarks on the Period of Edon80, by Jin Hong -
In this note we responde to the remarks of Jin Hong given in [1] regarding our stream cipher Edon80 [2]. Our mathematical understanding of the periods of streams that are produced by Edon80 is now much deeper then in the time of the design of the cipher. According to that mathematical knowledge, we discuss two scenarios how to deal with the further treatment concerning Edon80 submission to ECRY...
متن کاملAdding MAC functionality to Edon80
In this paper we show how the synchronous stream cipher Edon80 proposed as a candidate stream cipher in Profile 2 of the eSTREAM project, can be efficiently upgraded to synchronous stream cipher with authentication. We are achieving that by simple addition of two-bit registers into the e-transformers of Edon80 core, an additional 160-bit shift register and by putting additional communication lo...
متن کاملA Key Recovery Attack on Edon80
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submitted to eSTREAM. It is now one of the 8 nal hardware candidates. In this paper we cryptanalyze the cipher by describing a key recovery attack. The complexity of the attack is around 2 simple operations for a keystream...
متن کاملPrediction Model for CNC Turning on AISI316 with Single and Multilayered Cutting tool Using Box Behnken Design (RESEARCH NOTE)
Austenitic stainless steels (AISI316) are used for many commercial and industrial applications for their excellent corrosive resistance. AISI316 is generally difficult to machine material due to their high strength and high work hardening tendency. Tool wear (TW) and surface roughness (SR) are broadly considered the most challenging phases causing poor quality in machining. Optimization of cutt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007