6,119 Hits in 3.3 sec

Resistance of S-Boxes against Algebraic Attacks [chapter]

Jung Hee Cheon, Dong Hoon Lee
2004 Lecture Notes in Computer Science  
As a result, we show that S-boxes with Gold exponents have very weak resistance and S-boxes with Kasami exponents have slightly better resistance against algebraic attacks than those with the inverse exponents  ...  By applying them to maximally nonlinear power functions with the inverse exponents, Gold exponents, or Kasami exponents, we estimate their resistance against algebraic attacks.  ...  resistance against algebraic attacks.  ... 
doi:10.1007/978-3-540-25937-4_6 fatcat:xrpbakd4cvdzhft22i6uyurtk4

Different Types of Attacks on Block Ciphers

2020 International journal of recent technology and engineering  
By Solving these equations, we made algebraic attack on S-box.  ...  In this paper, algebraic attack is used to formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system by using a classical method called Grobner  Bases  ...  THE RESISTANCE OF ALGEBRAIC ATTACKS (RAA) One S-box with good cryptographic properties can ensure the cipher to resist against a variety of cryptanalysis methods, so any shortcomings of S-box will weaken  ... 
doi:10.35940/ijrte.c4214.099320 fatcat:eb26junbdfgxxdflmlgwzj5e5m

New Directions in Cryptanalysis of Block Ciphers

Davood RezaeiPour, Mohamad Rushdan Md Said
2009 Journal of Computer Science  
Conclusion: The improved S-box is resistant against interpolation attack. We can develop the derivatives of interpolation attack using the estimations of S-box with less nonlinearity.  ...  Problem statement: The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression.  ...  We also introduced the version of AES S-box which was resistant against interpolation attack. Finally we illustrated the new directions for the future research.  ... 
doi:10.3844/jcssp.2009.1091.1094 fatcat:i7pij2ctsjh3db6ezasfbd46k4

An Improved AES S-box Based on Fibonacci Numbers and Prime Factor

Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria, Mohd Nazran Mohammed Pauzi
2018 International Journal of Network Security  
The AES S-box and the new proposed S-box were analysed to verify the cryptographical security of the S-box.  ...  The level of security S-box was evaluated based on the cryptographic properties such as balance criteria, nonlinearity, correlation immunity, algebraic degree, transparency order, propagation, number of  ...  (017/2017) by the Ministry of Education Malaysia.  ... 
dblp:journals/ijnsec/MohamedAAZP18 fatcat:q362v4qkzzb55nfq7ihwdwwwvy

Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm

Fatma Nilofer, Jihad Qaddour
2018 International Journal of Computer Applications  
This paper presents a comparative study of these cryptographic algorithms as well as related attacks and the contribution of various researchers in overcoming these attacks.  ...  One of the main purpose of LTE security is to perform user's authentication and to provide data integrity and confidentiality.  ...  To increase the resistance of SNOW 2.0 against algebraic attacks, the designers used the 32-bit register R3 and S-Box S2 in FSM such that R3 gets as input the output of S2 [3] .  ... 
doi:10.5120/ijca2018916587 fatcat:claswkciwvcgxh4alvly6yqrni

On selected issues of Boolean function application in symmetric key cryptography against side channel attacks

Kamaruzzaman Seman, Muhammad Fahim Roslan, Azni Haslizan Ab Halim, M Nor Azizi Syam Mohd Sayuti
2019 Journal of Physics, Conference Series  
Within this work, the nonlinearity and correlation immunity issues of Boolean function is discussed followed by complementary counter measure against side channel attack especially differential power attack  ...  However, there may be some issues and conflicting criteria which prevent such a Boolean function to resist the algorithm to all known attacks.  ...  TO would have lower value if the S-Box are better shielded while higher value for less secure S-Box against DPA.  ... 
doi:10.1088/1742-6596/1282/1/012001 fatcat:43gbjqnggvakbno4kmjmxdcviu

Analysis of the algebraic side channel attack

Claude Carlet, Jean-Charles Faugère, Christopher Goyet, Guénaël Renault
2012 Journal of Cryptographic Engineering  
Moreover if the S-boxes are replaced by functions C.  ...  At CHES 2009, Renauld, Standaert and Veyrat-Charvillon introduced a new kind of attack called algebraic side-channel attacks (ASCA).  ...  Thus, the S-boxes must be carefully chosen to make the cipher resistant against cryptanalysis. In our attacks, the S-boxes (seen as black boxes) leak information from the manipulated data.  ... 
doi:10.1007/s13389-012-0028-0 fatcat:7cahq2nnnzcxzdk6f3h7w4trka

Research on the Security Criterion of S‐Boxes Against Division Property

Wang Senpeng, Hu Bin, Guan Jie, Shi Tairong, Zhang Kai
2021 Chinese journal of electronics  
We propose a new security criterion of S-boxes against division property and prove that it is invariant under permutation-xor equivalence.  ...  Based on the criterion, the division properties of some important 4-bit S-boxes are showed.  ...  level against other attacks (fulfilling the design criteria of S-boxes).  ... 
doi:10.1049/cje.2020.10.013 fatcat:l4qau22i3jaz5hnfclw76y6aae

Analysis of Development of Dynamic S-Box Generation

Amandeep Singh, Praveen Agarwal, Mehar Chand
2017 Computer Science and Information Technology  
Since 2000 onwards a number of algebraic attacks on AES have been carried out, which challenged the security of AES.  ...  But the main limitation of the S-Box in AES is that it is a static one throughout the algorithm, which is the main center of attraction for the cryptanalyst to analysis the weakness for certain attacks  ...  The author claims that new S-Boxes provide algorithm resistance to algebraic attacks and algebraic properties of new S-Boxes are as good as AES S-Boxes.  ... 
doi:10.13189/csit.2017.050502 fatcat:ew6saq4cfvhmhmv7dnryfidita

Loiss: A Byte-Oriented Stream Cipher [chapter]

Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu
2011 Lecture Notes in Computer Science  
To further improve the capability in resisting against those attacks, the S-boxes in BOMM must also possess some good cryptographic properties, for example, high algebraic immunity, high nonlinearity,  ...  The algorithm is based on a linear feedback shift register, and uses a structure called BOMM in the filter generator, which has good property on resisting against algebraic attacks, linear distinguishing  ...  Acknowledgement During the design of Loiss, a large number of graduate students from the State Key Laboratory of Information Security, Chinese Academy of Sciences, have made significant contributions.  ... 
doi:10.1007/978-3-642-20901-7_7 fatcat:io5npyaksratpb62z3gwibg6fa

Design of a New Stream Cipher: PALS [article]

Mohammadreza Ashouri
2018 arXiv   pre-print
As a result, the output keystream is very similar to the perfectly random sequences and resistant to conventional attacks such as correlation attacks, algebraic attack, divide & conquer attack, time-memory  ...  In this paper, a new stream cipher is designed as a clock-controlled one, but with a new mechanism of altering steps based on system theory in such a way that the structures used in it are resistant to  ...  The content of stage 128 and 129 are used to select one of the S-boxes (the sequence 00 will select the first S-box, 01 the second S-box, 10 the third S-box, and 11 the fourth Sbox).  ... 
arXiv:1807.01115v2 fatcat:7yfyhggr6rho3g7z6mi55px5ne

Generating and Exploring S-Box Multivariate Quadratic Equation Systems with SageMath [article]

A.-M. Leventi-Peetz, J.-V. Peetz
2017 arXiv   pre-print
We consolidate the deficiency of previously presented MQ metrics, supposed to quantify the resistance of S-boxes against algebraic attacks.  ...  A new method to derive Multivariate Quadratic equation systems (MQ) for the input and output bit variables of a cryptographic S-box from its algebraic expressions with the aid of the computer mathematics  ...  Algebraic attacks and S-box optimization For quantifying the resistance against algebraic attacks for r equations in t terms over GF (2 n ) Cui et al.  ... 
arXiv:1506.04319v3 fatcat:4rh6i5zu5ffmvkkebylwiq43fe

Customizable sponge-based authenticated encryption using 16-bit S-boxes

Matthew Kelly, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, Stanislaw Radziszowski
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable  ...  However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use.  ...  In particular, we provided proof of resistance against linear and differential attacks as well as solid reasoning for resistance against algebraic attacks.  ... 
doi:10.1109/milcom.2015.7357416 dblp:conf/milcom/KellyKKLR15 fatcat:7kqpgbqzjjgfbkcwckirsnpdvm

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes [chapter]

Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golić
2006 Lecture Notes in Computer Science  
The new criteria are shown to be necessary and sufficient for resistance against the divide-and-conquer algebraic attacks by conditional or unconditional equations.  ...  In particular, the algebraic degrees of classically resilient S-boxes are restricted to lower values.  ...  Sboxes with high algebraic degrees are desirable for resistance against algebraic attacks. Lemma 10. The algebraic degree of any n × m S-box F is at most n − 1 if m ≥ 2.  ... 
doi:10.1007/11734727_19 fatcat:6lt6vxeu3fbp5drby3m5xttowa

Cryptographic Properties and Quadratic Equations of S-Box in SMS4

Kuan Jiang Xiong, Zhi Hua Hu
2012 Advanced Engineering Forum  
Analysis of the S-box password SMS4 algorithm characteristics, discussed the algorithm of S-box algebraic balance, nonlinearity, avalanche characteristics, diffusion characteristics, and XLS attack the  ...  Compared with the S-box of AES, Camellia algorithm, algorithm SMS4 S-box design has reached the standards of Europe and the United States block cipher standard algorithm for the S-box design.  ...  Acknowledgments This research was supported by the Hubei Province Natural Science Foundation 2010CDZ019, the outstanding young talents of the Hubei Provincial Department of Education project Foundation  ... 
doi:10.4028/ fatcat:2gvsziwovndjrh3xchp7wyifd4
« Previous Showing results 1 — 15 out of 6,119 results