A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Improved Impossible Differential Attacks on Large-Block Rijndael
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008. ...
Using those, we can improve the previous impossible differential cryptanalysis of both 9-round Rijndael-224 and Rijndael-256. The improvement can lead to 10-round attack on Rijndael-256 as well. ...
best impossible differential attacks on Rijndael-224 and Rijndael-256. ...
doi:10.1007/978-3-642-37682-5_10
fatcat:rgzy2ybo5vaehhun5qsroa6x54
New attacks against reduced Rijndael‐160
2021
IET Information Security
The first 9-round meet-in-the-middle (MITM) attack and improved 8-round impossible differential (ID) attacks on Rijndael-160 are studied here. ...
With this attack path, a 5-round MITM distinguisher with a technique of the truncated differential characteristic is proposed, and then the attack on 9-round Rijndael-160 is performed. ...
rounds in large-block Rijndael Note: R d denotes the number of rounds of the MITM distinguisher or impossible differential. ...
doi:10.1049/ise2.12038
fatcat:ml25e3nox5gbph4xgq32ma4qfu
Development of the approach to proving the security of block ciphers to impossible differential attack
2017
Eastern-European Journal of Enterprise Technologies
The impossible differential attack (IDA) is one of the most powerful cryptanalytic attacks on many modern block symmetric ciphers (BSC). ...
The necessary condition of attack is the existence of impossible differentials (ID), which cover almost all rounds of BSC. ...
doi:10.15587/1729-4061.2017.108413
fatcat:22ulqjlklveoddzzlq2fbjkadq
Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks
2012
Tatra Mountains Mathematical Publications
The strength of Rijndael-like ciphers to the truncated differential attack is considered. ...
Theorems about the absence of effective truncated (byte) differential characteristics and effective truncated (byte) differentials for ciphers with sufficient number of rounds are proved. ...
This can make possible to prove the security of Rijndael-like cipher with large block to truncated differential attack. The attack of truncated differentials was proposed by L. K n u d s e n [4] . ...
doi:10.2478/v10127-012-0046-4
fatcat:mxtrguy2qfesfcm2cjkb23yzb4
Results of Ukrainian national public cryptographic competition
2010
Tatra Mountains Mathematical Publications
An overview of proposed sym- metric block ciphers and results of their security analysis is given in this paper. ...
Five symmetric block ciphers were proposed to Ukrainian national public cryptographic competition. Developers used different methods for achiev- ing security and performance of the algorithms. ...
Similar to differential cryptanalysis results were got for linear cryptanalysis, truncated and impossible differentials, integral cryptanalysis, interpolation and boomerang attacks [14] . ...
doi:10.2478/v10127-010-0033-6
fatcat:fzqket2qzjft5jue6climua7uy
Survey and benchmark of block ciphers for wireless sensor networks
2006
ACM transactions on sensor networks
Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy ...
We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. ...
His impossible differential attack on 6-round KASUMI requires 2 55 chosen plaintexts and 2 100 encryptions. ...
doi:10.1145/1138127.1138130
fatcat:jlm77sv6rvdi3jzgmbnumg6pua
Symmetric Algorithm Survey: A Comparative Analysis
[article]
2014
arXiv
pre-print
This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation ...
General attacks that were revealed against concentrated rounds editions of Rijndael [25] are Square Attack, Improved Square Attack, Impossible Differential Attack and Reversed Key Schedule Attack, but ...
AES (Rijndael) Security of Rijndael depends on its variable nature key size allowing up to a key size of 256-bit, to provide resistance against certain future attacks (collision attacks and potential quantum ...
arXiv:1405.0398v1
fatcat:q3vk77mtkrffrn4lmrwzo3szia
Speeding up Collision Search for Byte-Oriented Hash Functions
[chapter]
2009
Lecture Notes in Computer Science
The method is illustrated with the collision and second preimage attacks on the compression functions based on Rijndael. ...
The tool is applicable when an attack is based on a differential trail, whose probability determines the complexity of the attack. ...
Though we do not know how to exploit this fact in attacks on Rijndael as a block cipher, it is valuable if we consider a Rijndael-based compression function. ...
doi:10.1007/978-3-642-00862-7_11
fatcat:3h3p4x5zqbhqtkfhbqf432f3gm
Study of a new link layer security scheme in a wireless sensor network
[article]
2012
arXiv
pre-print
While a variety of security techniques are being developed and lots of researches are going on security fields. ...
Mr.K¨uhn found an impossible differential attack on 4-round MISTY1 using 238 chosen plaintexts and 262 encryptions. ...
Security Babbage and Frisch demonstrate the possibility of a 7th order differential cryptanalytic attack on 5-round MISTY1, none of the S-boxes with optimal linear and differential properties has an optimal ...
arXiv:1209.5428v1
fatcat:nknkvgtixnauxidpi2x5dt6fry
A New Involutory MDS Matrix for the AES
2009
International Journal of Network Security
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns operations by a new involutory matrix in every round. ...
Concerning impossible differential (ID) [4, 27] attacks, any truncated differential (with probability one) involving two rounds must involve at least 17 active S-boxes, because of the branch number of ...
The MDS-AES construction shows quite good resistance against differential, linear, multiset, collision, impossible differential and boomerang attacks. ...
dblp:journals/ijnsec/JrA09
fatcat:oq3oeaip4rhenibcvcvlxjv2ky
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192
2015
IET Information Security
An important motivation for the study of large-block Rijndael is the deployment of Rijndael-like permutations in the design of hash functions, Whirlwind [26], SHAvite-3 [27], Whirlpool [28], ECHO [29], ...
Therefore resistance to related-key attack becomes one of the important design aims for block ciphers, actually this was also stated as one of the design goals of the Rijndael. ...
Our results show that the related-key rectangle attack is one of the best methods to analyze Rijndael and Rijndael-like structures. ...
doi:10.1049/iet-ifs.2014.0380
fatcat:qkeeonseunaqtgnzs4rmvf6ovm
A Survey on Advanced Encryption Standard
2017
International Journal of Science and Research (IJSR)
Rijndael's Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect the sensitive information. The key sizes of AES are 128, 192, 256 bits. ...
AES is based on substitution-permutation strategy. It is accepted by NIST in 2001 after the five year of security evaluation. ...
B.Baharak [40] proposed a impossible differential attack, which is done on AES-128 upto seven round. It requires 2 115.5 plaintext, 2 109 bytes memory and 2 119 seven round encryption. ...
doi:10.21275/art20164149
fatcat:37j5ensjfrhyhabd5kdedzrquq
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants
[chapter]
2004
Lecture Notes in Computer Science
The attack on eight rounds requires 2 88 plaintext/ciphertext pairs and its complexity is about 2 183 encryptions. ...
Using impossible related-key differentials we can break seven rounds with 2 111 plaintext/ciphertext pairs and computational complexity 2 116 . ...
Impossible Related-Key Differentials Attack Impossible differential attack against Rijndael reduced to five rounds was proposed by Biham and Keller [6] . ...
doi:10.1007/978-3-540-24654-1_15
fatcat:uwxcheok5rajhj66hb2qsdy5qe
Report on the development of the Advanced Encryption Standard (AES)
2001
Journal of Research of the National Institute of Standards and Technology
NIST reviewed the results of this preliminary research and selected MARS, RC6™, Rijndael, Serpent and Twofish as finalists. ...
Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES). ...
Rijndael The Rijndael specification describes a truncated differential attack on 4, 5, and 6 round variants of Rijndael [22] , based on a 3 round distinguisher of Rijndael. ...
doi:10.6028/jres.106.023
pmid:27500035
pmcid:PMC4863838
fatcat:5z6apmeharczrlys346zrwybie
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
[chapter]
2006
Lecture Notes in Computer Science
In addition, they generally aim to be implemented efficiently on a large variety of platforms. ...
The proposed design is parametric in the text, key and processor size, allows efficient combination of encryption/decryption, "on-the-fly" key derivation and its security against a number of recent cryptanalytic ...
Impossible differentials [7] are usually built by concatenating two incompatible truncated differentials. ...
doi:10.1007/11733447_16
fatcat:o76am47afbhilfralu5dfas7xi
« Previous
Showing results 1 — 15 out of 290 results