منابع مشابه
Improved Linear Cryptanalysis of SMS4 Block Cipher
SMS4 is a block cipher standard used for wireless communications in China. We analyze a reduced versions of SMS4 by the multidimensional linear cryptanalysis method. Our analysis shows that the 23-round of SMS4 can be attacked with 2 data complexity and time complexity less than exhaustive search.
متن کاملNew Linear Attacks on Block Cipher GOST
Defined in the standard GOST 28147-89, GOST is a Soviet and Russian government standard symmetric-key block cipher. GOST has the 64-bit block size and a key length of 256 bits. It is a Feistel network of 32 rounds. In 2010, GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard. GOST 28147-89 has also been published as informational RFC 5830 with IETF. In this pape...
متن کاملLinear Approximations Representation of Moamagar Block Cipher
The security of block ciphers is assessed through their resistance to known attacks. One of the most important attacks is linear cryptanalysis. In this paper, we describe a model for presenting linear approximations for Moamagar block cipher. This graph shows the whole space of linear approximations for the block cipher algorithm is presented through its obtained multi-level weighted directed g...
متن کاملA Block Cipher Generation Using Color Substitution
The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms, Keys with more number of bits (Longer ke...
متن کاملA Traceable Block Cipher
In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called meta-key from which they were derived, or t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2007
ISSN: 1549-3636
DOI: 10.3844/jcssp.2007.556.560