Block Ciphers - A Survey
نویسنده
چکیده
In this paper we give a short overview of the state of the art of secret key block ciphers. We focus on the main application of block ciphers, namely for encryption. The most important known attacks on block ciphers are linear cryptanalysis and differential cryptanalysis. Linear cryptanalysis makes use of so-called linear hulls i.e., the parity of a subset of plaintext bits which after a certain number of rounds equals the parity of a subset of ciphertext bits with a probability sufficiently far away from one half. Differential cryptanalysis makes use of so-called differentials (A, B), i.e., a pair of plaintexts with difference A, which after a certain number of rounds result in a difference B with a high probability. The hulls and differentials can be used to derive (parts of) the secret key. Also, several extensions of the two above attacks have been introduced lately: the truncated differential attack [38,39], the higher order differential attack [43,38,28], the multiple linear attack [30], and the non-linear/linear attack [41]. Also, a combination of the two methods, the differential-linear attack [27], has been considered. Other (general) attacks are the non-surjective attack [68] and the interpolation attack [28]. To improve resistance against differential and linear cryptanalysis it has been suggested to use power polynomials in a finite field [3,62,51]. On the other hand, it has been shown that if a cipher consists solely of such functions other efficient attacks become possible [28]. Another well-known way of improving the security of a block cipher is by means of multiple encryption, i.e., where a plaintext block is processed several times using the same (component) block cipher with different keys. In § 2 an introduction to block ciphers is given and § 3 lists and discusses the modes of operation for encryption. In § 4 we describe the theoretical and practical security of block ciphers. The most important methods of cryptanalysing block ciphers are given in § 5. § 6 discusses design principles of block ciphers, in particular it is shown how to build ciphers immune to the attacks described in previous sections. The theory of multiple encryption is described in § 7. In § 8 we summarise our results.
منابع مشابه
A Survey of Cryptanalytic Attacks on Lightweight Block Ciphers
Lightweight block ciphers are used in applications where low power consumption is a requirement along with hardware area constraints regarding their implementation. Design of these ciphers demands an optimal tradeoff between computational efficiency and security. These ciphers being supportive in fast and secure transmission of data from one location to another are prone to several attacks that...
متن کاملBlock and Stream Cipher Based Cryptographic Algorithms: A Survey
The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other c...
متن کاملBlock Ciphers and Stream Ciphers: The State of the Art
In these lecture notes we survey the state of the art in symmetric key encryption, in particular in the block ciphers and stream ciphers area. The areas of symmetric key encryption has been very active in the last five years due to growing interest from academic and industry research, standardization efforts like AES, NESSIE and CRYPTREC, as well as due to ease of government control over export...
متن کاملEvaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey
The conventional cryptography solutions are ill-suited to strict memory, size and power limitations of resourceconstrained devices, so lightweight cryptography solutions have been specifically developed for this type of applications. In this domain of cryptography, the term lightweight never refers to inadequately low security, but rather to establishing the best balance to maintain sufficient ...
متن کاملStream Ciphers: Dead or Alive?
Secret key cryptography was traditionally divided into block ciphers and stream ciphers, but over the last 30 years the balance had steadily shifted, and today stream ciphers have become an endangered species. In this talk I'll survey the current state of the art in stream ciphers: who needs them, who uses them, how they are attacked, and how they can be protected by new types of constructions.
متن کاملAttacks in Stream Ciphers: A Survey
Nowadays there are different types of attacks in block and stream ciphers. In this work we will present some of the most used attacks on stream ciphers. We will present the newest techniques with an example of usage in a cipher, explain and comment. Previous we will
متن کامل