نتایج جستجو برای: impossible differential attack

تعداد نتایج: 397729  

In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection and the possibility of re-checking initial faults and the possibility to recover internal state...

2009
Yiyuan Luo Zhongming Wu Xuejia Lai

In this paper, we propose a systematic search method for finding the impossible differential characteristic for block cipher structures, better than the U-method introduced by Kim et al [6]. This method is referred as unified impossible differential (UID) cryptanalysis. We give practical UID cryptanalysis on some popular block ciphers and give the detailed impossible differential characteristic...

2006
Laurent Poinsot

The objective of this contribution is to introduce an analogue to the classical secret-key block ciphers, such as DES, IDEA or AES, in the nondenumerable setting, namely where cleartexts, plaintexts and keys are real numbers. The nonlinear part of traditional secret-key block ciphers, the S-boxes, is designed to provide confusion i.e. to resist to several kind of cryptanalysis such as algebraic...

2017
Mehak Khurana Meena Kumari

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The emerging need of the secure ciphers has lead to the designing and analysis of many lightweight block ciphers. In this respect, many lightweight block ciphers have been designed, of which is simple AES, one of the popular proposed secure block c...

Journal: :The Journal of Korea Navigation Institute 2015

Journal: :Inf. Sci. 2009
Yiyuan Luo Xuejia Lai Zhongming Wu Guang Gong

In this paper, we propose a systematic method for finding impossible differentials for block cipher structures, better than the Umethod introduced by Kim et al [4]. It is referred as a unified impossible differential finding method (UID-method). We apply the UID-method to some popular block ciphers such as Gen-Skipjack, Gen-CAST256, GenMARS, Gen-RC6, Four-Cell, SMS4 and give the detailed imposs...

Journal: :International Journal of Computing and Digital Systems 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید