메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 167-180

A new class of weak keys for blowfish

Author keywords

Blowfish; Cryptanalysis; Fixed point; Key dependent S Box; Reflection attack; Self similarity analysis; Weak key

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; CRYPTOGRAPHY; INFORMATION ANALYSIS;

EID: 38149004545     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_11     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 2
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. of Cryptology 7, 229-246 (1994)
    • (1994) J. of Cryptology , vol.7 , pp. 229-246
    • Biham, E.1
  • 4
    • 84957610784 scopus 로고    scopus 로고
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
  • 5
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Preneel, B, ed, EURO-CRYPT 2000, Springer, Heidelberg
    • Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EURO-CRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 6
    • 84978995497 scopus 로고
    • The Real Reason for Rivest's Phenomenon
    • Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
    • Coppersmith, D.: The Real Reason for Rivest's Phenomenon. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 535. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 535
    • Coppersmith, D.1
  • 7
    • 0000139052 scopus 로고    scopus 로고
    • Cryptanalysis of Alleged A5 Stream Cipher
    • Fumy, W, ed, EURO-CRYPT 1997, Springer, Heidelberg
    • Golić, J.: Cryptanalysis of Alleged A5 Stream Cipher, In: Fumy, W. (ed.) EURO-CRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 239-255
    • Golić, J.1
  • 8
    • 33646763786 scopus 로고    scopus 로고
    • Rediscovery of the Time Memory Tradeoff, Cryptology ePrint Archive
    • Report 2005/090
    • Hong, J., Sarkar, P.: Rediscovery of the Time Memory Tradeoff, Cryptology ePrint Archive, Report 2005/090 (2005)
    • (2005)
    • Hong, J.1    Sarkar, P.2
  • 9
    • 84962976253 scopus 로고
    • Is DES a pure Cipher(Results of More Cycling Experiments on DES)
    • Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
    • Kaliski, B.S., Rivest, R.L., Sherman, A.T.: Is DES a pure Cipher(Results of More Cycling Experiments on DES). In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, p. 212. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 212
    • Kaliski, B.S.1    Rivest, R.L.2    Sherman, A.T.3
  • 10
    • 38149010306 scopus 로고    scopus 로고
    • Reflection Attacks on Product Ciphers, Cryptology ePrint Archive
    • Report 2007/043
    • Kara, O.: Reflection Attacks on Product Ciphers, Cryptology ePrint Archive, Report 2007/043 (2007)
    • (2007)
    • Kara, O.1
  • 11
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method of DES Cipher
    • Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
    • Matsui, M.: Linear Cryptanalysis Method of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 12
    • 85032513290 scopus 로고
    • Cycle Structures of the DES with Weak and Semi-Weak Keys
    • Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
    • Moore, J.H., Simmons, G.J.: Cycle Structures of the DES with Weak and Semi-Weak Keys, In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 9-32. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 9-32
    • Moore, J.H.1    Simmons, G.J.2
  • 13
    • 0023294945 scopus 로고
    • Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
    • IEEE Computer Society Press, Los Alamitos
    • Moore, J.H., Simmons, G.J.: Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. In: IEEE Transactions on Software Engineering, vol. SE-13, pp. 262-273. IEEE Computer Society Press, Los Alamitos (1987)
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , pp. 262-273
    • Moore, J.H.1    Simmons, G.J.2
  • 16
    • 84953635000 scopus 로고
    • Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish)
    • Anderson, R, ed, Fast Software Encryption, Springer, Heidelberg
    • Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) Fast Software Encryption. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.809 , pp. 191-204
    • Schneier, B.1
  • 17
    • 38149138604 scopus 로고    scopus 로고
    • http://www.schneier.com/blowfish.html
  • 18
    • 84958986778 scopus 로고    scopus 로고
    • On the Weak Keys of Blowfish
    • Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
    • Vaudenay, S.: On the Weak Keys of Blowfish. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 27-32. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1039 , pp. 27-32
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.