Filters








947 Hits in 4.1 sec

IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES

Raphael Chung-Wei Phan
2003 Cryptologia  
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES).  ...  In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.  ...  Introduction The Advanced Encryption Standard (AES) is the standard algorithm adopted by the National Institute of Standards and Technology (NIST) to replace the ageing Data Encryption Standard (DES) for  ... 
doi:10.1080/0161-110391891964 fatcat:t2etfwohwnfmhd6knqu4dt2oa4

Some aspects with the use of improved slide attack to the standard Encryption algorithm GOST 28147-89

Akhmedov B.B
2020 International Journal of Advanced Trends in Computer Science and Engineering  
The article demonstrates the mechanism of using slide attack method to provide security assessment of the standard encryption algorithm GOST 28147-89 when uses weak keys.  ...  1 until the end of the rounds.For fixed S-blocks of standard encryption algorithm GOST 28147-89, to determine slide pairs which supply four round particularity and satisfy term of combined slide attack  ...  The study showed that the identified shortcomings of symmetric data encryption algorithms using linear, differential and linear differential methods of cryptanalysis can be eliminated by increasing the  ... 
doi:10.30534/ijatcse/2020/48922020 fatcat:hitofmhduvfnjdnblqcibvquda

Polytopic Cryptanalysis [chapter]

Tyge Tiessen
2016 Lecture Notes in Computer Science  
We prove that the methodology of standard differential cryptanalysis can unambiguously be extended and transferred to the polytopic case including impossible differentials.  ...  Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.  ...  The author also thanks Dmitry Khovratovich and the anonymous reviewers for comments that helped to considerably improve the quality of the paper.  ... 
doi:10.1007/978-3-662-49890-3_9 fatcat:5jq2zpluabacxiuxznirqskmui

Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis [chapter]

Raphael C. -W. Phan, Sung-Ming Yen
2006 Lecture Notes in Computer Science  
The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied  ...  In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover  ...  Impossible-DFA on the AES Before we proceed with a description of the attack, we briefly introduce a 3-round impossible differential of the AES, which is a variant of the 4-round impossible differential  ... 
doi:10.1007/11733447_10 fatcat:apt7dfbvhncqbo7ykwhz5jwdhe

Symmetric Cryptography (Dagstuhl Seminar 16021)

Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, Bart Preneel, Marc Herbstritt
2016 Dagstuhl Reports  
It was the fifth in the series of the Dagstuhl seminars "Symmetric Cryptography" held in 2007, 2009, 2012, and 2014.  ...  Abstracts of the presentations were given during the seminar. The first section describes the seminar topics and goals in general.  ...  We prove that the methodology of standard differential cryptanalysis can unambiguously be extended and transferred to the polytopic case including impossible differentials.  ... 
doi:10.4230/dagrep.6.1.34 dblp:journals/dagstuhl-reports/ArmknechtINP16 fatcat:3p4woms76ncrdm5hkd2iempk74

An Algebraic Interpretation of $\mathcal{AES}$ 128 [chapter]

Ilia Toli, Alberto Zanoni
2005 Lecture Notes in Computer Science  
We analyze an algebraic representation of AES−128 as an embedding in BES, due to Murphy and Robshaw. We present two systems of equations S and K concerning encryption and key generation processes.  ...  C1 has 16 very dense equations of degree up to 255 in each of its 16 variables. With a single pair  ...  On January 2, 1997, NIST began the process of choosing a replacement for DES. The replacement should be called AES (Advanced Encryption Standard).  ... 
doi:10.1007/11506447_8 fatcat:jkgeoqortjgpjf63ksn6l7kbqq

Analysis of Encryption Algorithms Proposed for Data Security in 4G and 5G Generations

Khalid Fadhil Jasim, Kayhan Zrar Ghafoor, Halgurd S. Maghdid, A. Kattan
2022 ITM Web of Conferences  
The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated.  ...  Cryptanalysis methods play important roles in determining the security of these algorithms. Thus, some cryptanalysis methods have been explored and investigated.  ...  Analysis of AES Cipher Algorithm Advanced Encryption Standard (AES) proposed according to the National Institute of Standards and Technology [7] .  ... 
doi:10.1051/itmconf/20224201004 fatcat:yxpoqudo2fckjonohaa5x7uleu

Integral Cryptanalysis of the Block Cipher E2 [article]

Wentan Yi, Shaozhen Chen
2014 arXiv   pre-print
Block cipher E2, designed and submitted by Nippon Telegraph and Telephone Corporation, is a first-round Advanced Encryption Standard candidate.  ...  In this paper, we focus on the key-recovery attacks on reduced-round E2-128/192 taking both IT and FT functions in consideration with integral cryptanalysis.  ...  It was designed and submitted to Advanced Encryption Standard project by Nippon Telegraph and Telephone Corporation.  ... 
arXiv:1405.6483v2 fatcat:havevott5nadxegtwbabuz67gy

Related-Key Differential Cryptanalysis of 192-bit Key AES Variants [chapter]

Goce Jakimoski, Yvo Desmedt
2004 Lecture Notes in Computer Science  
A related-key differential cryptanalysis is applied to the 192bit key variant of AES.  ...  cipher becomes resistant to differential cryptanalysis after sufficiently many rounds, but this is not true in the case of related-key differentials.  ...  Introduction On October 2, 2000, after a long and complex evaluation process, NIST announced that it has selected Rijndael [9] to propose for the Advanced Encryption Standard.  ... 
doi:10.1007/978-3-540-24654-1_15 fatcat:uwxcheok5rajhj66hb2qsdy5qe

Symmetric Algorithm Survey: A Comparative Analysis [article]

Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid
2014 arXiv   pre-print
Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to  ...  To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by implementing security parameter  ...  ACKNOWLEDGMENTS The authors would like to acknowledge the support of Sir Syed University of Engineering & Technology and IQRA University Karachi.  ... 
arXiv:1405.0398v1 fatcat:q3vk77mtkrffrn4lmrwzo3szia

MODERN CRYPTOGRAPHY TECHNIQUES FOR INCREASE NETWORK SECURITY

Solmazsharifnia
2018 Zenodo  
Network security involves theauthorization of access to data in a network, which is controlled by the network administrator.  ...  Network security is involved inorganizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with itsprinciples.  ...  The cipher is susceptible to various forms of cryptanalysis, and has acted as a catalyst in the discovery of differential and linear cryptanalysis.  ... 
doi:10.5281/zenodo.2163563 fatcat:z73wlq7ykbavlewo6yjuybt6wm

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis [chapter]

Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
2001 Lecture Notes in Computer Science  
Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES).  ...  It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e.  ...  Camellia supports 128-bit block size and 128-, 192-, and 256-bit key lengths, and so offers the same interface specifications as the Advanced Encryption Standard (AES).  ... 
doi:10.1007/3-540-44983-3_4 fatcat:nbdmqe5pdnez3c6f7wsn3en7wi

The DBlock family of block ciphers

WenLing Wu, Lei Zhang, XiaoLi Yu
2015 Science China Information Sciences  
G n is the main nonlinear transform in encryption and it consists of n/64 identical 32-bit nonlinear function T in parallel.  ...  For key schedule of DBlock, it basically employs the same module used in encryption, except the choice of different byte permutations, which can improve its suitability for various implementation environments  ...  differential cryptanalysis Impossible differential cryptanalysis [22] may be one of the most powerful attacks against reduced round DBlock.  ... 
doi:10.1007/s11432-014-5219-0 fatcat:kmj5v65jijgmpa3kygk25geyh4

The (related-key) impossible boomerang attack and its application to the AES block cipher

Jiqiang Lu
2010 Designs, Codes and Cryptography  
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA.  ...  Impossible differential cryptanalysis and the boomerang attack are powerful variants of differential cryptanalysis for analysing the security of a block cipher.  ...  Chris Mitchell and the anonymous referees for their comments on earlier versions of this paper, and also very grateful to the editor for his/her editorial efforts during the review of this paper.  ... 
doi:10.1007/s10623-010-9421-9 fatcat:k6fj2orwjvaw5kuh4n6rutfboi

Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia [chapter]

Wenling Wu, Lei Zhang, Wentao Zhang
2009 Lecture Notes in Computer Science  
Most recently, Wu et al constructed some 8-round impossible differentials of Camellia, and presented an attack on 12-round .  ...  Later in [6], Lu et al improved the above attack by using the same 8-round impossible differential and some new observations on the diffusion transformation of Camellia.  ...  Introduction The block cipher Camellia [1] , with the same interface specification as the Advanced Encryption Standard(AES), supports 128-bit block size and 128-, 192and 256-bit key sizes, which can usually  ... 
doi:10.1007/978-3-642-04159-4_29 fatcat:oukyao6m3nczlgthlonbqupla4
« Previous Showing results 1 — 15 out of 947 results