A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES
2003
Cryptologia
Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). ...
In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently. ...
Introduction The Advanced Encryption Standard (AES) is the standard algorithm adopted by the National Institute of Standards and Technology (NIST) to replace the ageing Data Encryption Standard (DES) for ...
doi:10.1080/0161-110391891964
fatcat:t2etfwohwnfmhd6knqu4dt2oa4
Some aspects with the use of improved slide attack to the standard Encryption algorithm GOST 28147-89
2020
International Journal of Advanced Trends in Computer Science and Engineering
The article demonstrates the mechanism of using slide attack method to provide security assessment of the standard encryption algorithm GOST 28147-89 when uses weak keys. ...
1 until the end of the rounds.For fixed S-blocks of standard encryption algorithm GOST 28147-89, to determine slide pairs which supply four round particularity and satisfy term of combined slide attack ...
The study showed that the identified shortcomings of symmetric data encryption algorithms using linear, differential and linear differential methods of cryptanalysis can be eliminated by increasing the ...
doi:10.30534/ijatcse/2020/48922020
fatcat:hitofmhduvfnjdnblqcibvquda
Polytopic Cryptanalysis
[chapter]
2016
Lecture Notes in Computer Science
We prove that the methodology of standard differential cryptanalysis can unambiguously be extended and transferred to the polytopic case including impossible differentials. ...
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher. ...
The author also thanks Dmitry Khovratovich and the anonymous reviewers for comments that helped to considerably improve the quality of the paper. ...
doi:10.1007/978-3-662-49890-3_9
fatcat:5jq2zpluabacxiuxznirqskmui
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
[chapter]
2006
Lecture Notes in Computer Science
The use of techniques from conventional differential cryptanalysis in DFAs is not new; however, to the best of our knowledge, more advanced differential-like attack techniques have so far not been applied ...
In more detail, we apply the DFA on the AES key schedule or on intermediate states within the AES and then exploit distinguishers based on Square attacks and impossible differential cryptanalysis to cover ...
Impossible-DFA on the AES Before we proceed with a description of the attack, we briefly introduce a 3-round impossible differential of the AES, which is a variant of the 4-round impossible differential ...
doi:10.1007/11733447_10
fatcat:apt7dfbvhncqbo7ykwhz5jwdhe
Symmetric Cryptography (Dagstuhl Seminar 16021)
2016
Dagstuhl Reports
It was the fifth in the series of the Dagstuhl seminars "Symmetric Cryptography" held in 2007, 2009, 2012, and 2014. ...
Abstracts of the presentations were given during the seminar. The first section describes the seminar topics and goals in general. ...
We prove that the methodology of standard differential cryptanalysis can unambiguously be extended and transferred to the polytopic case including impossible differentials. ...
doi:10.4230/dagrep.6.1.34
dblp:journals/dagstuhl-reports/ArmknechtINP16
fatcat:3p4woms76ncrdm5hkd2iempk74
An Algebraic Interpretation of $\mathcal{AES}$ 128
[chapter]
2005
Lecture Notes in Computer Science
We analyze an algebraic representation of AES−128 as an embedding in BES, due to Murphy and Robshaw. We present two systems of equations S and K concerning encryption and key generation processes. ...
C1 has 16 very dense equations of degree up to 255 in each of its 16 variables. With a single pair ...
On January 2, 1997, NIST began the process of choosing a replacement for DES. The replacement should be called AES (Advanced Encryption Standard). ...
doi:10.1007/11506447_8
fatcat:jkgeoqortjgpjf63ksn6l7kbqq
Analysis of Encryption Algorithms Proposed for Data Security in 4G and 5G Generations
2022
ITM Web of Conferences
The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated. ...
Cryptanalysis methods play important roles in determining the security of these algorithms. Thus, some cryptanalysis methods have been explored and investigated. ...
Analysis of AES Cipher Algorithm Advanced Encryption Standard (AES) proposed according to the National Institute of Standards and Technology [7] . ...
doi:10.1051/itmconf/20224201004
fatcat:yxpoqudo2fckjonohaa5x7uleu
Integral Cryptanalysis of the Block Cipher E2
[article]
2014
arXiv
pre-print
Block cipher E2, designed and submitted by Nippon Telegraph and Telephone Corporation, is a first-round Advanced Encryption Standard candidate. ...
In this paper, we focus on the key-recovery attacks on reduced-round E2-128/192 taking both IT and FT functions in consideration with integral cryptanalysis. ...
It was designed and submitted to Advanced Encryption Standard project by Nippon Telegraph and Telephone Corporation. ...
arXiv:1405.6483v2
fatcat:havevott5nadxegtwbabuz67gy
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants
[chapter]
2004
Lecture Notes in Computer Science
A related-key differential cryptanalysis is applied to the 192bit key variant of AES. ...
cipher becomes resistant to differential cryptanalysis after sufficiently many rounds, but this is not true in the case of related-key differentials. ...
Introduction On October 2, 2000, after a long and complex evaluation process, NIST announced that it has selected Rijndael [9] to propose for the Advanced Encryption Standard. ...
doi:10.1007/978-3-540-24654-1_15
fatcat:uwxcheok5rajhj66hb2qsdy5qe
Symmetric Algorithm Survey: A Comparative Analysis
[article]
2014
arXiv
pre-print
Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to ...
To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by implementing security parameter ...
ACKNOWLEDGMENTS The authors would like to acknowledge the support of Sir Syed University of Engineering & Technology and IQRA University Karachi. ...
arXiv:1405.0398v1
fatcat:q3vk77mtkrffrn4lmrwzo3szia
MODERN CRYPTOGRAPHY TECHNIQUES FOR INCREASE NETWORK SECURITY
2018
Zenodo
Network security involves theauthorization of access to data in a network, which is controlled by the network administrator. ...
Network security is involved inorganizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with itsprinciples. ...
The cipher is susceptible to various forms of cryptanalysis, and has acted as a catalyst in the discovery of differential and linear cryptanalysis. ...
doi:10.5281/zenodo.2163563
fatcat:z73wlq7ykbavlewo6yjuybt6wm
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
[chapter]
2001
Lecture Notes in Computer Science
Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). ...
It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. ...
Camellia supports 128-bit block size and 128-, 192-, and 256-bit key lengths, and so offers the same interface specifications as the Advanced Encryption Standard (AES). ...
doi:10.1007/3-540-44983-3_4
fatcat:nbdmqe5pdnez3c6f7wsn3en7wi
The DBlock family of block ciphers
2015
Science China Information Sciences
G n is the main nonlinear transform in encryption and it consists of n/64 identical 32-bit nonlinear function T in parallel. ...
For key schedule of DBlock, it basically employs the same module used in encryption, except the choice of different byte permutations, which can improve its suitability for various implementation environments ...
differential cryptanalysis Impossible differential cryptanalysis [22] may be one of the most powerful attacks against reduced round DBlock. ...
doi:10.1007/s11432-014-5219-0
fatcat:kmj5v65jijgmpa3kygk25geyh4
The (related-key) impossible boomerang attack and its application to the AES block cipher
2010
Designs, Codes and Cryptography
The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. ...
Impossible differential cryptanalysis and the boomerang attack are powerful variants of differential cryptanalysis for analysing the security of a block cipher. ...
Chris Mitchell and the anonymous referees for their comments on earlier versions of this paper, and also very grateful to the editor for his/her editorial efforts during the review of this paper. ...
doi:10.1007/s10623-010-9421-9
fatcat:k6fj2orwjvaw5kuh4n6rutfboi
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
[chapter]
2009
Lecture Notes in Computer Science
Most recently, Wu et al constructed some 8-round impossible differentials of Camellia, and presented an attack on 12-round . ...
Later in [6], Lu et al improved the above attack by using the same 8-round impossible differential and some new observations on the diffusion transformation of Camellia. ...
Introduction The block cipher Camellia [1] , with the same interface specification as the Advanced Encryption Standard(AES), supports 128-bit block size and 128-, 192and 256-bit key sizes, which can usually ...
doi:10.1007/978-3-642-04159-4_29
fatcat:oukyao6m3nczlgthlonbqupla4
« Previous
Showing results 1 — 15 out of 947 results