메뉴 건너뛰기




Volumn 9, Issue 1, 1996, Pages 1-19

Substitution-permutation networks resistant to differential and linear cryptanalysis

Author keywords

Differential cryptanalysis; Linear cryptanalysis; Product cipher; S box; Substitution permutation network

Indexed keywords


EID: 0003099980     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/bf02254789     Document Type: Article
Times cited : (69)

References (31)
  • 2
    • 0026817719 scopus 로고
    • On immunity against Biham and Shamir's differential cryptanalysis
    • C. M. Adams. On immunity against Biham and Shamir's differential cryptanalysis. Information Processing Letters, 41(2):77-80,1992.
    • (1992) Information Processing Letters , vol.41 , Issue.123
    • Adams, C.M.1
  • 3
    • 0025530315 scopus 로고
    • The structured design of cryptographically good S-boxes
    • C. M. Adams and S. E. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(l):21-4l, 1990.
    • (1990) Journal of Cryptology , vol.3
    • Adams, C.M.1    Tavares, S.E.2
  • 4
    • 0020846854 scopus 로고
    • The design of complete encryption networks using cryptographically equivalent permutations
    • F. Ayoub. The design of complete encryption networks using cryptographically equivalent permutations. Computers and Security, 2:261-267, 1982.
    • (1982) Computers and Security , vol.2 , pp. 261-267
    • Ayoub, F.1
  • 5
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(l):3-72,1991.
    • (1991) Journal of Cryptology , vol.432
    • Biham, E.1    Shamir, A.2
  • 7
    • 84985824783 scopus 로고
    • Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer
    • Springer-Verlag, Berlin
    • E. Biham and A. Shamir. Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer. Advances in Cryptology: Proceedings ofCRYPTO '91, Springer-Verlag, Berlin, pages 156-171, 1992.
    • (1992) Advances in Cryptology: Proceedings OfCRYPTO '91 , pp. 156-171
    • Biham, E.1    Shamir, A.2
  • 8
    • 84957677472 scopus 로고
    • Differential cryptanalysis of the full 16-round des
    • Springer-Verlag, Berlin
    • E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. Advances in Cryptology: Proceedings ofCRYPTO '92, Springer-Verlag, Berlin, pages 487-496, 1993.
    • (1993) Advances in Cryptology: Proceedings OfCRYPTO '92 , pp. 487-496
    • Biham, E.1    Shamir, A.2
  • 10
    • 84985833497 scopus 로고
    • LOKI-a cryptographic primitive for authentication and secrecy applications
    • Springer-Verlag, Berlin
    • L. Brown, J. Pieprzyk, and J. Seberry. LOKI-a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology: Proceedings ofAUSCRYPT '90, Springer-Verlag, Berlin, pages 229-236, 1990.
    • (1990) Advances in Cryptology: Proceedings OfAUSCRYPT '90 , pp. 229-236
    • Brown, L.1    Pieprzyk, J.2    Seberry, J.3
  • 11
    • 84962952891 scopus 로고
    • On the design of permutation P in des type cryptosystems
    • Springer-Verlag, Berlin
    • L. Brown and J. R. Seberry. On the design of permutation P in DES type cryptosystems. Advances in Cryptology: Proceedings ofEUROCRYPT '89, Springer-Verlag, Berlin, pages 696-705, 1989.
    • (1989) Advances in Cryptology: Proceedings OfEUROCRYPT '89 , pp. 696-705
    • Brown, L.1    Seberry, J.R.2
  • 12
    • 85020558749 scopus 로고
    • An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks
    • Springer-Verlag, Berlin
    • M. H. Dawson and S. E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology: Proceedings ofEUROCRYPT '91, Springer-Verlag, Berlin, pages 352-367, 1991.
    • (1991) Advances in Cryptology: Proceedings OfEUROCRYPT '91 , pp. 352-367
    • Dawson, M.H.1    Tavares, S.E.2
  • 13
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, 1973.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 14
    • 0016579870 scopus 로고
    • Some cryptographic techniques for machine-to-machine data communications
    • H. Feistel, W. A. Notz, and J. L. Smith. Some cryptographic techniques for machine-to-machine data communications. Proceedings of the IEEE, 63(11): 1545-1554, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.11 , pp. 1545-1554
    • Feistel, H.1    Notz, W.A.2    Smith, J.L.3
  • 15
    • 0025638337 scopus 로고
    • Methods and instruments for designing S-boxes
    • R. Forré. Methods and instruments for designing S-boxes. Journal of Cryptology, 2(3):115-130, 1990.
    • (1990) Journal of Cryptology , vol.2 , Issue.3 , pp. 115-130
    • Forré, R.1
  • 16
    • 0018530910 scopus 로고
    • A structured design of substitution-permutation encryption networks
    • J. B. Kam and G. I. Davida. A structured design of substitution-permutation encryption networks. IEEE Transactions on Computers, 28(10):747-753, 1979.
    • (1979) IEEE Transactions on Computers , vol.28 , Issue.10 , pp. 747-753
    • Kam, J.B.1    Davida, G.I.2
  • 17
    • 0009319575 scopus 로고
    • Iterative characteristics of des and s2-DES
    • Springer-Verlag, Berlin
    • L. R. Knudsen. Iterative characteristics of DES and s2-DES. Advances in Cryptology: Proceedings of CRYPTO '92, Springer-Verlag, Berlin, pages 497-511, 1993.
    • (1993) Advances in Cryptology: Proceedings of CRYPTO '92 , pp. 497-511
    • Knudsen, L.R.1
  • 18
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Springer-Verlag, Berlin
    • M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology: Proceedings of EUROCRYPT '93, Springer-Verlag, Berlin, pages 386-397, 1994.
    • (1994) Advances in Cryptology: Proceedings of EUROCRYPT '93 , pp. 386-397
    • Matsui, M.1
  • 20
    • 0003508568 scopus 로고
    • Federal Information Processing Standard Publication 46, U.S. Department of Commerce, January
    • National Bureau of Standards. Data Encryption Standard (DES). Federal Information Processing Standard Publication 46, U.S. Department of Commerce, January 1977.
    • (1977) Data Encryption Standard (DES)
  • 22
    • 0002206751 scopus 로고
    • On the construction of highly nonlinear permutations
    • Springer-Verlag, Berlin
    • K. Nyberg. On the construction of highly nonlinear permutations. Advances in Cryptology: Proceedings ofEUROCRYPT '92, Springer-Verlag, Berlin, pages 92-98, 1992.
    • (1992) Advances in Cryptology: Proceedings OfEUROCRYPT '92 , pp. 92-98
    • Nyberg, K.1
  • 23
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • Springer-Verlag, Berlin
    • K. Nyberg. Differentially uniform mappings for cryptography. Advances in Cryptology: Proceedings of EUROCRYPT '93, Springer-Verlag, Berlin, pages 55-64, 1994.
    • (1994) Advances in Cryptology: Proceedings of EUROCRYPT '93 , pp. 55-64
    • Nyberg, K.1
  • 25
    • 84949023413 scopus 로고
    • On the distribution of characteristics in bijective mappings
    • Springer-Verlag, Berlin
    • L. J. O'Connor. On the distribution of characteristics in bijective mappings. Advances in Cryptology: Proceedings ofEUROCRYPT '93, Springer-Verlag, Berlin, pages 360-370, 1994.
    • (1994) Advances in Cryptology: Proceedings OfEUROCRYPT '93 , pp. 360-370
    • O'Connor, L.J.1
  • 26
    • 0024106741 scopus 로고
    • Towards effective nonlinear cryptosystem design
    • J. Pieprzyk and G. Finkelstein. Towards effective nonlinear cryptosystem design. IEE Proceedings, Part E, 135(6):325-335, 1988.
    • (1988) IEE Proceedings, Part e , vol.135 , Issue.6 , pp. 325-335
    • Pieprzyk, J.1    Finkelstein, G.2
  • 28
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical journal, 28:656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.