Results 1 
7 of
7
On the Data Complexity of Statistical Attacks Against Block Ciphers
 In Cryptology ePrint
, 2009
"... Abstract. Many attacks on iterated block ciphers rely on statistical considerations using plaintext/ciphertext pairs to distinguish some part of the cipher from a random permutation. We provide here a simple formula for estimating the amount of plaintext/ciphertext pairs which is needed for such dis ..."
Abstract

Cited by 6 (2 self)
 Add to MetaCart
Abstract. Many attacks on iterated block ciphers rely on statistical considerations using plaintext/ciphertext pairs to distinguish some part of the cipher from a random permutation. We provide here a simple formula for estimating the amount of plaintext/ciphertext pairs which is needed for such distinguishers and which applies to a lot of different scenarios (linear cryptanalysis, differentiallinear cryptanalysis, differential/truncated differential/impossible differential cryptanalysis). The asymptotic data complexities of all these attacks are then derived. Moreover, we give an efficient algorithm for computing the data complexity accurately.
Fast Correlation Attacks Against Stream Ciphers and Related Open Problems
 in &quot;Proceedings of the 2005 IEEE Information Theory Workshop on Theory and Practice in InformationTheoretic Security (ITW 2005), Awaji Island, Japon&quot;, Invited talk, IEEE Press, octobre
, 2005
"... related open problems ..."
(Show Context)
Asic hardware implementation of the idea nxt encryption algorithm
 In IEEE International Symposium on Circuits and Systems
"... ..."
(Show Context)
CONSTRUCTION OF NEW FAMILIES OF MDS DIFFUSION LAYERS
"... Abstract. Diusion layers are crucial components of symmetric ciphers. These components, along with suitable Sboxes, can make symmetric ciphers resistant against statistical attacks like linear and dierential cryptanalysis. Conventional MDS diusion layers, which are dened as matrices over nite elds ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
Abstract. Diusion layers are crucial components of symmetric ciphers. These components, along with suitable Sboxes, can make symmetric ciphers resistant against statistical attacks like linear and dierential cryptanalysis. Conventional MDS diusion layers, which are dened as matrices over nite elds, have been used in symmetric ciphers such as AES, Twosh and SNOW. In this paper, we study linear, linearized and nonlinear MDS diusion layers. We investigate linearized diusion layers, which are a generalization of conventional diusion layers; these diusion layers are used in symmetric ciphers like SMS4, Loiss and ZUC. We introduce some new families of linearized MDS diusion layers and as a consequence, we present a method for construction of randomized linear diusion layers over a nite eld. Nonlinear MDS diusion layers are introduced in Klimov's thesis; we investigate nonlinear MDS diusion layers theoretically, and we present a new family of nonlinear MDS diusion layers. We show that these nonlinear diusion layers can be made randomized with a low implementation cost. An important fact about linearized and nonlinear diusion layers is that they are more resistant against algebraic attacks in comparison to conventional diusion layers. A special case of diusion layers are (0,1)diusion layers. This type of diusion layers are used in symmetric ciphers like ARIA. We examine (0,1)diusion layers and prove a theorem about them. At last, we study linearized MDS diusion layers of symmetric ciphers Loiss, SMS4 and ZUC, from the mathematical viewpoint.
Analysis and Design of Correlation Testing Methods for Expanded Subkeys
, 2007
"... by ..."
(Show Context)
Making AES Stronger: AES with Key Dependent SBox
, 2008
"... With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. In this paper, we show a new property of Advanced Encryption Standard (AES)[1],[2],[3] using Sbox and Inverse Sbox. We also show how this property can be used to make the ..."
Abstract
 Add to MetaCart
(Show Context)
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. In this paper, we show a new property of Advanced Encryption Standard (AES)[1],[2],[3] using Sbox and Inverse Sbox. We also show how this property can be used to make the Sbox key dependent[5],[6],[7],[9],[24] and hence make AES stronger. This has been done without changing the basic operations of AES. The importance lies in the fact that the Sbox is made Key dependent without changing its values (ranging from 00 to FF) and without touching InvSbox. Detailed explanations of implementation are given. Key words:
Deliverable
, 2009
"... In this deliverable we introduce the fitness evaluation of services as another key pillar to enable evolution on service level. Here, the capability of rating services with regard to their environmental context and to compare them with each other allows the selection and deprecation of services on m ..."
Abstract
 Add to MetaCart
(Show Context)
In this deliverable we introduce the fitness evaluation of services as another key pillar to enable evolution on service level. Here, the capability of rating services with regard to their environmental context and to compare them with each other allows the selection and deprecation of services on multiple levels within the BIONETS service lifecycle. The work is organized in three central parts, as illustrated in Figure 1. C