Filters








290 Hits in 5.1 sec

Improved Impossible Differential Attacks on Large-Block Rijndael [chapter]

Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov
2013 Lecture Notes in Computer Science  
In this paper, we present more powerful 6-round impossible differentials for large-block Rijndael-224 and Rijndael-256 than the ones used by Zhang et al. in ISC 2008.  ...  Using those, we can improve the previous impossible differential cryptanalysis of both 9-round Rijndael-224 and Rijndael-256. The improvement can lead to 10-round attack on Rijndael-256 as well.  ...  best impossible differential attacks on Rijndael-224 and Rijndael-256.  ... 
doi:10.1007/978-3-642-37682-5_10 fatcat:rgzy2ybo5vaehhun5qsroa6x54

New attacks against reduced Rijndael‐160

Xiaoli Dong, Yongzhuang Wei
2021 IET Information Security  
The first 9-round meet-in-the-middle (MITM) attack and improved 8-round impossible differential (ID) attacks on Rijndael-160 are studied here.  ...  With this attack path, a 5-round MITM distinguisher with a technique of the truncated differential characteristic is proposed, and then the attack on 9-round Rijndael-160 is performed.  ...  rounds in large-block Rijndael Note: R d denotes the number of rounds of the MITM distinguisher or impossible differential.  ... 
doi:10.1049/ise2.12038 fatcat:ml25e3nox5gbph4xgq32ma4qfu

Development of the approach to proving the security of block ciphers to impossible differential attack

Victor Ruzhentsev, Yurii Onishchenko
2017 Eastern-European Journal of Enterprise Technologies  
The impossible differential attack (IDA) is one of the most powerful cryptanalytic attacks on many modern block symmetric ciphers (BSC).  ...  The necessary condition of attack is the existence of impossible differentials (ID), which cover almost all rounds of BSC.  ... 
doi:10.15587/1729-4061.2017.108413 fatcat:22ulqjlklveoddzzlq2fbjkadq

Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks

Victor Ruzhentsev, Victor Dolgov
2012 Tatra Mountains Mathematical Publications  
The strength of Rijndael-like ciphers to the truncated differential attack is considered.  ...  Theorems about the absence of effective truncated (byte) differential characteristics and effective truncated (byte) differentials for ciphers with sufficient number of rounds are proved.  ...  This can make possible to prove the security of Rijndael-like cipher with large block to truncated differential attack. The attack of truncated differentials was proposed by L. K n u d s e n [4] .  ... 
doi:10.2478/v10127-012-0046-4 fatcat:mxtrguy2qfesfcm2cjkb23yzb4

Results of Ukrainian national public cryptographic competition

Roman Oliynykov, Ivan Gorbenko, Viktor Dolgov, Viktor Ruzhentsev
2010 Tatra Mountains Mathematical Publications  
An overview of proposed sym- metric block ciphers and results of their security analysis is given in this paper.  ...  Five symmetric block ciphers were proposed to Ukrainian national public cryptographic competition. Developers used different methods for achiev- ing security and performance of the algorithms.  ...  Similar to differential cryptanalysis results were got for linear cryptanalysis, truncated and impossible differentials, integral cryptanalysis, interpolation and boomerang attacks [14] .  ... 
doi:10.2478/v10127-010-0033-6 fatcat:fzqket2qzjft5jue6climua7uy

Survey and benchmark of block ciphers for wireless sensor networks

Yee Wei Law, Jeroen Doumen, Pieter Hartel
2006 ACM transactions on sensor networks  
Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy  ...  We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations.  ...  His impossible differential attack on 6-round KASUMI requires 2 55 chosen plaintexts and 2 100 encryptions.  ... 
doi:10.1145/1138127.1138130 fatcat:jlm77sv6rvdi3jzgmbnumg6pua

Symmetric Algorithm Survey: A Comparative Analysis [article]

Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid
2014 arXiv   pre-print
This paper presents a comprehensive comparative analysis of different existing cryptographic algorithms (symmetric) based on their Architecture, Scalability, Flexibility, Reliability, Security and Limitation  ...  General attacks that were revealed against concentrated rounds editions of Rijndael [25] are Square Attack, Improved Square Attack, Impossible Differential Attack and Reversed Key Schedule Attack, but  ...  AES (Rijndael) Security of Rijndael depends on its variable nature key size allowing up to a key size of 256-bit, to provide resistance against certain future attacks (collision attacks and potential quantum  ... 
arXiv:1405.0398v1 fatcat:q3vk77mtkrffrn4lmrwzo3szia

Speeding up Collision Search for Byte-Oriented Hash Functions [chapter]

Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
2009 Lecture Notes in Computer Science  
The method is illustrated with the collision and second preimage attacks on the compression functions based on Rijndael.  ...  The tool is applicable when an attack is based on a differential trail, whose probability determines the complexity of the attack.  ...  Though we do not know how to exploit this fact in attacks on Rijndael as a block cipher, it is valuable if we consider a Rijndael-based compression function.  ... 
doi:10.1007/978-3-642-00862-7_11 fatcat:3h3p4x5zqbhqtkfhbqf432f3gm

Study of a new link layer security scheme in a wireless sensor network [article]

Nasrin Sultana, Tanvir Ahmed, A. B. M. Siddique Hossain
2012 arXiv   pre-print
While a variety of security techniques are being developed and lots of researches are going on security fields.  ...  Mr.K¨uhn found an impossible differential attack on 4-round MISTY1 using 238 chosen plaintexts and 262 encryptions.  ...  Security Babbage and Frisch demonstrate the possibility of a 7th order differential cryptanalytic attack on 5-round MISTY1, none of the S-boxes with optimal linear and differential properties has an optimal  ... 
arXiv:1209.5428v1 fatcat:nknkvgtixnauxidpi2x5dt6fry

A New Involutory MDS Matrix for the AES

Jorge Nakahara Jr., Élcio Abrahão
2009 International Journal of Network Security  
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns operations by a new involutory matrix in every round.  ...  Concerning impossible differential (ID) [4, 27] attacks, any truncated differential (with probability one) involving two rounds must involve at least 17 active S-boxes, because of the branch number of  ...  The MDS-AES construction shows quite good resistance against differential, linear, multiset, collision, impossible differential and boomerang attacks.  ... 
dblp:journals/ijnsec/JrA09 fatcat:oq3oeaip4rhenibcvcvlxjv2ky

Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192

Qingju Wang, Dawu Gu, Deniz Toz, Kerem Varici, Zhiqiang Liu
2015 IET Information Security  
An important motivation for the study of large-block Rijndael is the deployment of Rijndael-like permutations in the design of hash functions, Whirlwind [26], SHAvite-3 [27], Whirlpool [28], ECHO [29],  ...  Therefore resistance to related-key attack becomes one of the important design aims for block ciphers, actually this was also stated as one of the design goals of the Rijndael.  ...  Our results show that the related-key rectangle attack is one of the best methods to analyze Rijndael and Rijndael-like structures.  ... 
doi:10.1049/iet-ifs.2014.0380 fatcat:qkeeonseunaqtgnzs4rmvf6ovm

A Survey on Advanced Encryption Standard

2017 International Journal of Science and Research (IJSR)  
Rijndael's Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect the sensitive information. The key sizes of AES are 128, 192, 256 bits.  ...  AES is based on substitution-permutation strategy. It is accepted by NIST in 2001 after the five year of security evaluation.  ...  B.Baharak [40] proposed a impossible differential attack, which is done on AES-128 upto seven round. It requires 2 115.5 plaintext, 2 109 bytes memory and 2 119 seven round encryption.  ... 
doi:10.21275/art20164149 fatcat:37j5ensjfrhyhabd5kdedzrquq

Related-Key Differential Cryptanalysis of 192-bit Key AES Variants [chapter]

Goce Jakimoski, Yvo Desmedt
2004 Lecture Notes in Computer Science  
The attack on eight rounds requires 2 88 plaintext/ciphertext pairs and its complexity is about 2 183 encryptions.  ...  Using impossible related-key differentials we can break seven rounds with 2 111 plaintext/ciphertext pairs and computational complexity 2 116 .  ...  Impossible Related-Key Differentials Attack Impossible differential attack against Rijndael reduced to five rounds was proposed by Biham and Keller [6] .  ... 
doi:10.1007/978-3-540-24654-1_15 fatcat:uwxcheok5rajhj66hb2qsdy5qe

Report on the development of the Advanced Encryption Standard (AES)

J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback
2001 Journal of Research of the National Institute of Standards and Technology  
NIST reviewed the results of this preliminary research and selected MARS, RC6™, Rijndael, Serpent and Twofish as finalists.  ...  Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES).  ...  Rijndael The Rijndael specification describes a truncated differential attack on 4, 5, and 6 round variants of Rijndael [22] , based on a 3 round distinguisher of Rijndael.  ... 
doi:10.6028/jres.106.023 pmid:27500035 pmcid:PMC4863838 fatcat:5z6apmeharczrlys346zrwybie

SEA: A Scalable Encryption Algorithm for Small Embedded Applications [chapter]

François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater
2006 Lecture Notes in Computer Science  
In addition, they generally aim to be implemented efficiently on a large variety of platforms.  ...  The proposed design is parametric in the text, key and processor size, allows efficient combination of encryption/decryption, "on-the-fly" key derivation and its security against a number of recent cryptanalytic  ...  Impossible differentials [7] are usually built by concatenating two incompatible truncated differentials.  ... 
doi:10.1007/11733447_16 fatcat:o76am47afbhilfralu5dfas7xi
« Previous Showing results 1 — 15 out of 290 results