نتایج جستجو برای: impossible differential cryptanalysis

تعداد نتایج: 331382  

Journal: :Inf. Process. Lett. 1995
Amr M. Youssef Stafford E. Tavares

In this letter, we study the marginal density of the XOR distribution table, and the linear approximation table entries of regular substitution boxes (s-boxes). Based on this, we show that the fraction of good s-boxes (with regard to immunity against linear and differential cryptanalysis) increases dramatically with the number of input variables. Introduction Differential cryptanalysis [1], and...

Journal: :IACR Cryptology ePrint Archive 2013
Orr Dunkelman Nathan Keller

MISTY1 is a block cipher designed by Matsui in 1997. It is widely deployed in Japan where it is an e-government standard, and is recognized internationally as a NESSIE-recommended cipher as well as an ISO standard and an RFC. Moreover, MISTY1 was selected to be the blueprint on top of which KASUMI, the GSM/3G block cipher, was based. Since its introduction, and especially in recent years, MISTY...

2011
Céline Blondeau Benoît Gérard

Differential cryptanalysis is a well-known statistical attack on block ciphers. We present here a generalisation of this attack called multiple differential cryptanalysis. We study the data complexity, the time complexity and the success probability of such an attack and we experimentally validate our formulas on a reduced version of PRESENT. Finally, we propose a multiple differential cryptana...

Journal: :IACR Cryptology ePrint Archive 2011
Céline Blondeau Benoît Gérard

Differential cryptanalysis is a well-known statistical attack on block ciphers. We present here a generalisation of this attack called multiple differential cryptanalysis. We study the data complexity, the time complexity and the success probability of such an attack and we experimentally validate our formulas on a reduced version of PRESENT. Finally, we propose a multiple differential cryptana...

Journal: :IACR Cryptology ePrint Archive 2010
Huihui Yap Khoongming Khoo Axel Poschmann

The n-cell GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register) structure [8] is a generalized unbalanced Feistel network that can be considered as a generalization of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalized Feistel networks, e.g. SMS4 [11] and Camellia [5], is that it is parallelizable for up to n rounds. In hardwa...

Journal: :Communications in computer and information science 2021

In [9], the notion of c-differentials was introduced as a potential expansion differential cryptanalysis against block ciphers utilizing substitution boxes. Drawing inspiration from technique higher order cryptanalysis, in this paper we propose c-derivatives and differentials investigate their properties. Additionally, consider how several classes functions, namely multiplicative inverse functi...

2010
Huihui Yap Khoongming Khoo Axel Poschmann

The n-cell GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register) structure [8] is a generalized unbalanced Feistel network that can be considered as a generalization of the outer function FO of the KASUMI block cipher. An advantage of this cipher over other n-cell generalized Feistel networks, e.g. SMS4 [11] and Camellia [5], is that it is parallelizable for up to n rounds. In hardwa...

Journal: :IACR Transactions on Symmetric Cryptology 2016

2011
Christian Rechberger

Dear all, as announced in December the Grøstl hash function has been tweaked for the final round. The round3mods, updated specification, implementation and cryptanalysis are available at www.groestl.info. For the final round we have * significantly increased the size of the round constants to make the internal differential attack and its extensions impossible * and use different rotation consta...

Journal: :CoRR 2015
Hong-Wei Li Li Yang

Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis. On the other hand, researches of quantum algorithms have made great progress nowadays. This paper proposes two methods to apply quantum algorithms in differential cryptanalysis, and analysis their efficiencies and success prob...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید