메뉴 건너뛰기




Volumn E85-A, Issue 1, 2002, Pages 25-37

On the security of feistel ciphers with SPN round function against differential, linear, and truncated differential cryptanalysis

Author keywords

Differential cryptanalysis; Linear cryptanalysis; Security evaluation; Truncated differential cryptanalysis

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; LOGIC GATES; MATHEMATICAL TRANSFORMATIONS; PROBABILITY;

EID: 0036456363     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 1
    • 84949218850 scopus 로고    scopus 로고
    • Camellia: A 128-bit block cipher suitable for multiple platforms
    • Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Springer-Verlag, Berlin
    • K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, "Camellia: A 128-bit block cipher suitable for multiple platforms," Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Lecture Notes in Computer Science 2012, pp.39-56, Springer-Verlag, Berlin, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2012 , pp. 39-56
    • Aoki, K.1    Ichikawa, T.2    Kanda, M.3    Matsui, M.4    Moriai, S.5    Nakajima, J.6    Tokita, T.7
  • 2
    • 84948955781 scopus 로고
    • On Matsui's linear cryptanalysis
    • Advances in Cryptology-EUROCRYPT'94, Springer-Verlag, Berlin
    • E. Biham, "On Matsui's linear cryptanalysis," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp.341-355, Springer-Verlag, Berlin, 1995.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 341-355
    • Biham, E.1
  • 5
    • 84949229080 scopus 로고    scopus 로고
    • Practical security evaluation against differential and linear cryptanalyses for feistel ciphers with SPN round function
    • Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Springer-Verlag, Berlin
    • M. Kanda, "Practical security evaluation against differential and linear cryptanalyses for feistel ciphers with SPN round function," Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Lecture Notes in Computer Science 2012, pp.324-338, Springer-Verlag, Berlin, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2012 , pp. 324-338
    • Kanda, M.1
  • 6
    • 0012052654 scopus 로고    scopus 로고
    • Security of Camellia against truncated differential cryptanalysis
    • in preproceedings. LNCS to appear
    • M. Kanda and T. Matsumoto, "Security of Camellia against truncated differential cryptanalysis," Fast Software Encryption Workshop FSE2001, pp.298-312, in preproceedings, 2001. LNCS to appear.
    • (2001) Fast Software Encryption Workshop FSE2001 , pp. 298-312
    • Kanda, M.1    Matsumoto, T.2
  • 8
    • 84949230440 scopus 로고    scopus 로고
    • A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis
    • Selected Areas in Cryptography-5th Annual International Workshop, SAC'98, Springer-Verlag, Berlin
    • M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, and K. Ohta, "A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis," Selected Areas in Cryptography-5th Annual International Workshop, SAC'98, Lecture Notes in Computer Science 1556, pp.264-279, Springer-Verlag, Berlin, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1556 , pp. 264-279
    • Kanda, M.1    Takashima, Y.2    Matsumoto, T.3    Aoki, K.4    Ohta, K.5
  • 9
    • 85025652210 scopus 로고
    • Practically secure feistel ciphers
    • Fast Software Encryption-Cambridge Security Workshop, Springer-Verlag, Berlin
    • L.R. Knudsen, "Practically secure feistel ciphers," Fast Software Encryption-Cambridge Security Workshop, Lecture Notes in Computer Science 809, pp.211-221, Springer-Verlag, Berlin, 1994.
    • (1994) Lecture Notes in Computer Science , vol.809 , pp. 211-221
    • Knudsen, L.R.1
  • 10
    • 84948949623 scopus 로고
    • Truncated and higher order differentials
    • Fast Software Encryption-Second International Workshop, Springer-Verlag, Berlin
    • L.R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption-Second International Workshop, Lecture Notes in Computer Science 1008, pp.196-211, Springer-Verlag, Berlin, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 196-211
    • Knudsen, L.R.1
  • 11
    • 84958958039 scopus 로고    scopus 로고
    • Truncated differentials of SAFER
    • Fast Software Encryption-Third International Workshop, Springer-Verlag, Berlin
    • L.R. Knudsen and T.A. Berson, "Truncated differentials of SAFER," Fast Software Encryption-Third International Workshop, Lecture Notes in Computer Science 1039, pp.15-26, Springer-Verlag, Berlin, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039 , pp. 15-26
    • Knudsen, L.R.1    Berson, T.A.2
  • 12
    • 85019318892 scopus 로고
    • SAFER-K64: A byte oriented block-ciphering algorithm
    • Fast Software Encryption-Cambridge Security Workshop, Springer-Verlag, Berlin
    • J.L. Massey, "SAFER-K64: A byte oriented block-ciphering algorithm," Fast Software Encryption-Cambridge Security Workshop, Lecture Notes in Computer Science 809, pp.1-17, Springer-Verlag, Berlin, 1994.
    • (1994) Lecture Notes in Computer Science , vol.809 , pp. 1-17
    • Massey, J.L.1
  • 13
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Advances in Cryptology-EUROCRYPT'93, Springer-Verlag, Berlin
    • M. Matsui, "Linear cryptanalysis method for DES cipher," Advances in Cryptology-EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.386-397, Springer-Verlag, Berlin, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1
  • 14
    • 84948954431 scopus 로고
    • On correlation between the order of S-boxes and the strength of DES
    • Advances in Cryptology-EUROCRYPT'94, Springer-Verlag, Berlin
    • M. Matsui, "On correlation between the order of S-boxes and the strength of DES," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp.366-375, Springer-Verlag, Berlin, 1995.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 366-375
    • Matsui, M.1
  • 15
    • 4243325408 scopus 로고    scopus 로고
    • Differential path search of the block cipher E2
    • July
    • M. Matsui, "Differential path search of the block cipher E2," IEICE Technical Report, ISEC99-19, July 1999.
    • (1999) IEICE Technical Report , vol.ISEC99-19
    • Matsui, M.1
  • 16
    • 35048899696 scopus 로고    scopus 로고
    • Cryptanalysis of a reduced version of the block cipher E2
    • Fast Software Encryption-6th International Workshop, FSE'99, Springer-Verlag, Berlin
    • M. Matsui and T. Tokita, "Cryptanalysis of a Reduced Ver-sion of the Block Cipher E2," Fast Software Encryption-6th International Workshop, FSE'99, Lecture Notes in Computer Science 1636, pp.71-80, Springer-Verlag, Berlin, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 71-80
    • Matsui, M.1    Tokita, T.2
  • 17
    • 0035119642 scopus 로고    scopus 로고
    • Security of E2 against truncated differential cryptanalysis
    • Jan.
    • S. Moriai, M. Sugita, and M. Kanda, "Security of E2 against truncated differential cryptanalysis," IEICE Trans. Fundamentals, vol. E84-A, no.1, pp.319-325, Jan. 2001.
    • (2001) IEICE Trans. Fundamentals , vol.E84-A , Issue.1 , pp. 319-325
    • Moriai, S.1    Sugita, M.2    Kanda, M.3
  • 18
    • 0012022739 scopus 로고
    • National Bureau of Standards, Data Encryption Standard, FIPS-PUB-46, 1977.
    • (1977) Data Encryption Standard , vol.FIPS-PUB-46
  • 19
    • 84958979426 scopus 로고    scopus 로고
    • The cipher SHARK
    • Fast Software Encryption-Third International Workshop, Springer-Verlag, Berlin
    • V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E.D. Win, "The cipher SHARK," Fast Software Encryption-Third International Workshop, Lecture Notes in Computer Science 1039, pp.99-111, Springer-Verlag, Berlin, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039 , pp. 99-111
    • Rijmen, V.1    Daemen, J.2    Preneel, B.3    Bosselaers, A.4    Win, E.D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.