نتایج جستجو برای: differential cryptanalysis

تعداد نتایج: 296102  

2008
Qingju Wang Dawu Gu Vincent Rijmen Ya Liu Jiazhe Chen Andrey Bogdanov

In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008. Using those, we can improve the previous impossible differential cryptanalysis of both 9-round Rijndael224 and Rijndael-256. The improvement can lead to 10-round attack on Rijndael-256 as well. With 2 chosen plaintexts, an attack ...

2014
Chenhui Jin

© 2014 ETRI Journal, Volume 36, Number 6, December 2014 http://dx.doi.org/10.4218/etrij.14.0113.1335 The Lai-Massey scheme, proposed by Vaudenay, is a modified structure in the International Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the Lai-Massey scheme. Impossible differential cryptanalysis is a powerful technique used to recover the secret key of b...

Journal: :IACR Cryptology ePrint Archive 2013
Javad Alizadeh Nasour Bagheri Praveen Gauravaram Abhishek Kumar Somitra Kumar Sanadhya

SIMON is a family of lightweight block ciphers that was proposed by U.S National Security Agency (NSA). A cipher in this family with K-bit key and N -bit block is called SIMON N/K. In this paper we analyze the security of SIMON against linear cryptanalysis. We present several linear characteristics for all variants of SIMON with reduced number of rounds. Our best linear characteristic covers SI...

Journal: :Finite Fields and Their Applications 2023

Recently, a new concept called the c-differential uniformity was proposed by Ellingsen et al. (2020), which generalizes notion of differential measuring resistance against cryptanalysis. Since then, finding functions having low has attracted attention many researchers. However it seems that, at this moment, there are not non-monomial permutations uniformity. In paper, we present classes (almost...

Journal: :Designs, Codes and Cryptography 2021

Functions with low c-differential uniformity have optimal resistance to some types of differential cryptanalysis. In this paper, we investigate the power functions over finite fields odd characteristic. Based on known almost perfect nonlinear functions, present several classes $$f(x)=x^d$$ $$_{c}\varDelta _f\le 3$$ . Especially, two new c-nonlinear are proposed.

2012
Simon Knellwolf

Symmetric key cryptographic algorithms provide confidentiality, integrity, and authentication in modern communication systems. Our confidence in these algorithms is largely based on the fact that intense cryptanalysis has been carried out over several years without revealing any weakness. This thesis makes three independent contributions to the cryptanalysis of symmetric key primitives and hash...

Journal: :International Journal of Information Privacy, Security and Integrity 2019

Journal: :IACR Transactions on Symmetric Cryptology 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید