A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resistance of S-Boxes against Algebraic Attacks
[chapter]
2004
Lecture Notes in Computer Science
As a result, we show that S-boxes with Gold exponents have very weak resistance and S-boxes with Kasami exponents have slightly better resistance against algebraic attacks than those with the inverse exponents ...
By applying them to maximally nonlinear power functions with the inverse exponents, Gold exponents, or Kasami exponents, we estimate their resistance against algebraic attacks. ...
resistance against algebraic attacks. ...
doi:10.1007/978-3-540-25937-4_6
fatcat:xrpbakd4cvdzhft22i6uyurtk4
Different Types of Attacks on Block Ciphers
2020
International journal of recent technology and engineering
By Solving these equations, we made algebraic attack on S-box. ...
In this paper, algebraic attack is used to formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system by using a classical method called Grobner Bases ...
THE RESISTANCE OF ALGEBRAIC ATTACKS (RAA) One S-box with good cryptographic properties can ensure the cipher to resist against a variety of cryptanalysis methods, so any shortcomings of S-box will weaken ...
doi:10.35940/ijrte.c4214.099320
fatcat:eb26junbdfgxxdflmlgwzj5e5m
New Directions in Cryptanalysis of Block Ciphers
2009
Journal of Computer Science
Conclusion: The improved S-box is resistant against interpolation attack. We can develop the derivatives of interpolation attack using the estimations of S-box with less nonlinearity. ...
Problem statement: The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression. ...
We also introduced the version of AES S-box which was resistant against interpolation attack. Finally we illustrated the new directions for the future research. ...
doi:10.3844/jcssp.2009.1091.1094
fatcat:i7pij2ctsjh3db6ezasfbd46k4
An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
2018
International Journal of Network Security
The AES S-box and the new proposed S-box were analysed to verify the cryptographical security of the S-box. ...
The level of security S-box was evaluated based on the cryptographic properties such as balance criteria, nonlinearity, correlation immunity, algebraic degree, transparency order, propagation, number of ...
(017/2017) by the Ministry of Education Malaysia. ...
dblp:journals/ijnsec/MohamedAAZP18
fatcat:q362v4qkzzb55nfq7ihwdwwwvy
Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm
2018
International Journal of Computer Applications
This paper presents a comparative study of these cryptographic algorithms as well as related attacks and the contribution of various researchers in overcoming these attacks. ...
One of the main purpose of LTE security is to perform user's authentication and to provide data integrity and confidentiality. ...
To increase the resistance of SNOW 2.0 against algebraic attacks, the designers used the 32-bit register R3 and S-Box S2 in FSM such that R3 gets as input the output of S2 [3] . ...
doi:10.5120/ijca2018916587
fatcat:claswkciwvcgxh4alvly6yqrni
On selected issues of Boolean function application in symmetric key cryptography against side channel attacks
2019
Journal of Physics, Conference Series
Within this work, the nonlinearity and correlation immunity issues of Boolean function is discussed followed by complementary counter measure against side channel attack especially differential power attack ...
However, there may be some issues and conflicting criteria which prevent such a Boolean function to resist the algorithm to all known attacks. ...
TO would have lower value if the S-Box are better shielded while higher value for less secure S-Box against DPA. ...
doi:10.1088/1742-6596/1282/1/012001
fatcat:43gbjqnggvakbno4kmjmxdcviu
Analysis of the algebraic side channel attack
2012
Journal of Cryptographic Engineering
Moreover if the S-boxes are replaced by functions C. ...
At CHES 2009, Renauld, Standaert and Veyrat-Charvillon introduced a new kind of attack called algebraic side-channel attacks (ASCA). ...
Thus, the S-boxes must be carefully chosen to make the cipher resistant against cryptanalysis. In our attacks, the S-boxes (seen as black boxes) leak information from the manipulated data. ...
doi:10.1007/s13389-012-0028-0
fatcat:7cahq2nnnzcxzdk6f3h7w4trka
Research on the Security Criterion of S‐Boxes Against Division Property
2021
Chinese journal of electronics
We propose a new security criterion of S-boxes against division property and prove that it is invariant under permutation-xor equivalence. ...
Based on the criterion, the division properties of some important 4-bit S-boxes are showed. ...
level against other attacks (fulfilling the design criteria of S-boxes). ...
doi:10.1049/cje.2020.10.013
fatcat:l4qau22i3jaz5hnfclw76y6aae
Analysis of Development of Dynamic S-Box Generation
2017
Computer Science and Information Technology
Since 2000 onwards a number of algebraic attacks on AES have been carried out, which challenged the security of AES. ...
But the main limitation of the S-Box in AES is that it is a static one throughout the algorithm, which is the main center of attraction for the cryptanalyst to analysis the weakness for certain attacks ...
The author claims that new S-Boxes provide algorithm resistance to algebraic attacks and algebraic properties of new S-Boxes are as good as AES S-Boxes. ...
doi:10.13189/csit.2017.050502
fatcat:ew6saq4cfvhmhmv7dnryfidita
Loiss: A Byte-Oriented Stream Cipher
[chapter]
2011
Lecture Notes in Computer Science
To further improve the capability in resisting against those attacks, the S-boxes in BOMM must also possess some good cryptographic properties, for example, high algebraic immunity, high nonlinearity, ...
The algorithm is based on a linear feedback shift register, and uses a structure called BOMM in the filter generator, which has good property on resisting against algebraic attacks, linear distinguishing ...
Acknowledgement During the design of Loiss, a large number of graduate students from the State Key Laboratory of Information Security, Chinese Academy of Sciences, have made significant contributions. ...
doi:10.1007/978-3-642-20901-7_7
fatcat:io5npyaksratpb62z3gwibg6fa
Design of a New Stream Cipher: PALS
[article]
2018
arXiv
pre-print
As a result, the output keystream is very similar to the perfectly random sequences and resistant to conventional attacks such as correlation attacks, algebraic attack, divide & conquer attack, time-memory ...
In this paper, a new stream cipher is designed as a clock-controlled one, but with a new mechanism of altering steps based on system theory in such a way that the structures used in it are resistant to ...
The content of stage 128 and 129 are used to select one of the S-boxes (the sequence 00 will select the first S-box, 01 the second S-box, 10 the third S-box, and 11 the fourth Sbox). ...
arXiv:1807.01115v2
fatcat:7yfyhggr6rho3g7z6mi55px5ne
Generating and Exploring S-Box Multivariate Quadratic Equation Systems with SageMath
[article]
2017
arXiv
pre-print
We consolidate the deficiency of previously presented MQ metrics, supposed to quantify the resistance of S-boxes against algebraic attacks. ...
A new method to derive Multivariate Quadratic equation systems (MQ) for the input and output bit variables of a cryptographic S-box from its algebraic expressions with the aid of the computer mathematics ...
Algebraic attacks and S-box optimization For quantifying the resistance against algebraic attacks for r equations in t terms over GF (2 n ) Cui et al. ...
arXiv:1506.04319v3
fatcat:4rh6i5zu5ffmvkkebylwiq43fe
Customizable sponge-based authenticated encryption using 16-bit S-boxes
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable ...
However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use. ...
In particular, we provided proof of resistance against linear and differential attacks as well as solid reasoning for resistance against algebraic attacks. ...
doi:10.1109/milcom.2015.7357416
dblp:conf/milcom/KellyKKLR15
fatcat:7kqpgbqzjjgfbkcwckirsnpdvm
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes
[chapter]
2006
Lecture Notes in Computer Science
The new criteria are shown to be necessary and sufficient for resistance against the divide-and-conquer algebraic attacks by conditional or unconditional equations. ...
In particular, the algebraic degrees of classically resilient S-boxes are restricted to lower values. ...
Sboxes with high algebraic degrees are desirable for resistance against algebraic attacks. Lemma 10. The algebraic degree of any n × m S-box F is at most n − 1 if m ≥ 2. ...
doi:10.1007/11734727_19
fatcat:6lt6vxeu3fbp5drby3m5xttowa
Cryptographic Properties and Quadratic Equations of S-Box in SMS4
2012
Advanced Engineering Forum
Analysis of the S-box password SMS4 algorithm characteristics, discussed the algorithm of S-box algebraic balance, nonlinearity, avalanche characteristics, diffusion characteristics, and XLS attack the ...
Compared with the S-box of AES, Camellia algorithm, algorithm SMS4 S-box design has reached the standards of Europe and the United States block cipher standard algorithm for the S-box design. ...
Acknowledgments This research was supported by the Hubei Province Natural Science Foundation 2010CDZ019, the outstanding young talents of the Hubei Provincial Department of Education project Foundation ...
doi:10.4028/www.scientific.net/aef.6-7.54
fatcat:2gvsziwovndjrh3xchp7wyifd4
« Previous
Showing results 1 — 15 out of 6,119 results