Powiadomienia systemowe
- Sesja wygasła!
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the paper we present the results which enable to calculate the nonlinearity of the round function with quite large dimensions, e.g. 32 x 32 bits, which are used in some block ciphers. It can be used to estimate resistance of these ciphers against linear cryptanalysis. We give the application to linear cryptanalysis of the TGR block cipher.
Czasopismo
Rocznik
Tom
Strony
1037--1044
Opis fizyczny
Bibliogr. 11 poz.
Twórcy
autor
autor
- Military University of Technology, Faculty of Cybernetics, Institute of Mathematics and Cryptology, ul. Kaliskiego 2, 00-908 Warsaw, Poland, mkontak@wp.pl
Bibliografia
- ADAMS, C.M. (1997) Constructing Symmetric Ciphers Using the CAST Design Procedure. Design, Codes, and Cryptography 12 (3), 283-316.
- ADAMS, C.M. (1999) The CAST-256 Encryption Algorithm. Available at AES web site: csrc.nist.gov/encryption/aes
- AHMED, N. and RAO, K.R. (1975) Orthogonal Transforms for Digital Processing. Springer-Verlag.
- ANDERSON, R. and BIHAM, E. (1996) Tiger: New Hash Function. Third International Workshop. Fast Software Encryption. LNCS 1039. Springer-Verlag, 89-97.
- LEE, J., KEYS, II.M. and TAVARES, S.E. (1997) On the Resistance of the CAST Encryption Algorithm to Differential and Linear Cryptanalysis. Design, Codes, and Cryptography 12 (3), 267-282.
- MATSUI, M. (1994) Linear Cryptanalysis Method for DES Cipher. In: T. Helleseth, ed., Advances in Cryptology. Proceedings of Eurocrypt’93. LNCS 765. Springer-Verlag, 386-397.
- MEIER, W. and STAFFELBACH, O. (1990) Nonlinearity Criteria for Cryptographic Functions. In: J. -J. Quisquater and J. Vandewalle, eds., Advances in Cryptology. Proceedings of Eurocrypt'89 LNCS 434. Springer-Verlag, 549-562.
- NYBERG, K. (1991) Perfect Nonlinear S-Boxes. In: D.W. Davies, ed., Advances in Cryptology. Proceedings of Eurocrypt’91. LNCS 547. Springer-Verlag, 378-386.
- PIEPRZYK, J. and FINKELSTEIN, G. (1988) Towards Effective Nonlinear Cryptosystem Design. IEE Proceedings-E 135, 325-335.
- RIVEST, R.L. , ROBSHAW, M.J.B., SIDNEY, R. and YIN, Y.L. (2001) The RC6 Block Cipher. Available at AES web site: csrc.nist.gov/encryption/aes
- YOUSSEF, A.M., CHEN, Z.G., and TAVARES, S.E. (1997) Construction of Highly Nonlinear Injective S-Boxes with Application to CAST-like Encryption Algorithm. Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE’97), 330-333.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT5-0026-0012