Results 1  10
of
426,310
Correlation Attacks on Block Ciphers
, 1996
"... This report presents a new statistical attack on iterative block ciphers called the correlation attack which is a natural generalization of linear cryptanalysis. The attack is based on finding complexvalued functions on the input and the output of a cipher which have a high correlation. Their mutua ..."
Abstract
 Add to MetaCart
This report presents a new statistical attack on iterative block ciphers called the correlation attack which is a natural generalization of linear cryptanalysis. The attack is based on finding complexvalued functions on the input and the output of a cipher which have a high correlation
Likelihood Estimation For Block Cipher Keys
, 1994
"... In this paper, we give a general framework for the analysis of block ciphers using the statistical technique of likelihood estimation. We show how various recent successful cryptanalyses of block ciphers can be regarded in this framework. By analysing the SAFER block cipher in this framework we ..."
Abstract

Cited by 10 (2 self)
 Add to MetaCart
up a general framework for analysing block ciphers. In this framework the plaintext and ciphertext spaces are partitioned into a number of classes. We consider the probabilities of a plaintext in a given plaintext class being encrypted to a ciphertext in a given ciphertext class under different keys
Cipher
"... We consider a simple and secure way to realize a synchronous stream cipher from iterated hash functions. It is similar to the OFB mode where the underlying block cipher algorithm is replaced with the keyed hash function, adopting the secret suffix method[20]. We analyzed the key, the keystream and t ..."
Abstract
 Add to MetaCart
We consider a simple and secure way to realize a synchronous stream cipher from iterated hash functions. It is similar to the OFB mode where the underlying block cipher algorithm is replaced with the keyed hash function, adopting the secret suffix method[20]. We analyzed the key, the keystream
Cipher
"... AbstractThe “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and d ..."
Abstract
 Add to MetaCart
AbstractThe “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations
Cryptanalysis of the full MMB block cipher
"... Abstract. The block cipher MMB was designed by Daemen, Govaerts and Vandewalle, in 1993, as an alternative to the IDEA block cipher. We exploit and describe unusual properties of the modular multiplication in Z 2 32 −1, which lead to a differential attack on the full 6round MMB cipher (both version ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Abstract. The block cipher MMB was designed by Daemen, Govaerts and Vandewalle, in 1993, as an alternative to the IDEA block cipher. We exploit and describe unusual properties of the modular multiplication in Z 2 32 −1, which lead to a differential attack on the full 6round MMB cipher (both
On the Indifferentiability of KeyAlternating Ciphers
"... Abstract. The AdvancedEncryptionStandard (AES)is the most widely used block cipher. The high level structure of AES can be viewed as a (10round) keyalternating cipher, where a tround keyalternating cipher KAt consists of a small number t of fixed permutations Pi on n bits, separated by key addit ..."
Abstract

Cited by 16 (2 self)
 Add to MetaCart
Abstract. The AdvancedEncryptionStandard (AES)is the most widely used block cipher. The high level structure of AES can be viewed as a (10round) keyalternating cipher, where a tround keyalternating cipher KAt consists of a small number t of fixed permutations Pi on n bits, separated by key
Markov Ciphers and Differential Cryptanalysis
 Advances in Cryptology  CRYPTO '91
, 1991
"... This paper considers the security of iterated block ciphers against the differential cryptanalysis introduced by Biham and Shamir. Differential cryptanalysis is a chosenplaintext attack on secretkey block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16r ..."
Abstract

Cited by 134 (4 self)
 Add to MetaCart
This paper considers the security of iterated block ciphers against the differential cryptanalysis introduced by Biham and Shamir. Differential cryptanalysis is a chosenplaintext attack on secretkey block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16
A Proposal for a New Block Encryption Standard
, 1991
"... A new secretkey block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit long. The cipher is based on the design concept of "mixing operations from different algebraic grou ..."
Abstract

Cited by 189 (3 self)
 Add to MetaCart
A new secretkey block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit long. The cipher is based on the design concept of "mixing operations from different algebraic
The PYRAMIDS block cipher
 International Journal of Network Security
, 2005
"... symmetric encryption algorithm of a 64, 128, 256bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round. ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
symmetric encryption algorithm of a 64, 128, 256bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round.
Elastic Block Ciphers
, 2004
"... We introduce a new concept of elastic block ciphers, symmetrickey encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational loa ..."
Abstract

Cited by 9 (7 self)
 Add to MetaCart
We introduce a new concept of elastic block ciphers, symmetrickey encryption algorithms that for a variable size input do not expand the plaintext, (i.e., do not require plaintext padding), while maintaining the diffusion property of traditional block ciphers and adjusting their computational
Results 1  10
of
426,310