نتایج جستجو برای: impossible differential cryptanalysis

تعداد نتایج: 331382  

Journal: :IACR Cryptology ePrint Archive 2011
Shengbao Wu Mingsheng Wang

Estimating immunity against differential and linear cryptanalysis is essential in designing secure block ciphers. A practical measure to achieve it is to find the minimal number of active S-boxes, or a lower bound for this minimal number. In this paper, we provide a general algorithm using integer programming, which not only can estimate a good lower bound of the minimal differential active S-b...

Journal: :Tatra Mountains Mathematical Publications 2016

Journal: :International Journal on Cryptography and Information Security 2012

Journal: :IACR Cryptology ePrint Archive 2011
Farzaneh Abazari Babak Sadeghian

Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show its application we combine ternary difference approach with conventional differential cryptanalysis and apply that to cryptanalysis the reduced round PRESENT. We also use ant colony technique to obtain the best differen...

Journal: :PeerJ PrePrints 2017
Sankhanil Dey Ranjan Ghosh

Bitwise-Xor of two 4 bit binary numbers or 4-bit bit patterns entitled 4-bit differences carries information in Cryptography. The Method to Analyze Cryptographic cipher algorithms or 4-bit substitution boxes with 4-bit differences is known as Differential Cryptanalysis. In this paper a brief review of Differential Cryptanalysis of 4-bit bijective Crypto S-Boxes and a new algorithm to analyze th...

2005
Jaechul Sung Jongsung Kim Changhoon Lee Seokhie Hong

Related-cipher attack was introduced by Hongjun Wu in 2002 [25]. We can consider related ciphers as block ciphers with the same round function but different number of rounds. This attack can be applied to related ciphers by using the fact that their key schedules do not depend on the total number of rounds. In this paper we introduce differential related-cipher attack on block ciphers, which co...

2011
Nicky Mouha Qingju Wang Dawu Gu Bart Preneel

Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-key primitives. For modern ciphers, resistance against these attacks is therefore a mandatory design criterion. In this paper, we propose a novel technique to prove security bounds against both differential and linear cryptanalysis. We use mixedinteger linear programming (MILP), a method that is f...

Journal: :CoRR 2006
Andrea Caranti Francesca Dalla Volta Massimiliano Sala F. Villani

We answer a question of Paterson, showing that all block systems for the group generated by the round functions of a key-alternating block cipher are the translates of a linear subspace. Following up remarks of Paterson and Shamir, we exhibit a connection to truncated differential cryptanalysis. We also give a condition that guarantees that the group generated by the round functions of a key-al...

Journal: :International Journal of Electronics and Telecommunications 2023

Currently, the Republic of Kazakhstan is developing a new standard for symmetric data encryption. One candidates role Qamal encryption algorithm developed by Institute Information and Computer Technologies (Almaty, Kazakhstan). The article describes algorithm. Differential properties main operations that make up cypher are considered in questions stability. We have shown version with 128-bit bl...

Journal: :Security and Communication Networks 2022

The impossible differential attack is one of the most fundamental tools cryptanalysis and has been successfully applied to a large variety block ciphers. In typical attack, foundation first step construct an differential. Nowadays, two kinds commonly used approaches in construction are matrix-based tool-aided automatic search methods. this paper, we proposed new method combining early-abort str...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید