On the Distribution of Linear Biases: Three Instructive Examples
نویسندگان
چکیده
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin – from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed. Thus, on the one hand these examples serve as counter examples to common beliefs and on the other hand serve as a guideline for future work.
منابع مشابه
Comparison of three Estimation Procedures for Weibull Distribution based on Progressive Type II Right Censored Data
In this paper, based on the progressive type II right censored data, we consider estimates of MLE and AMLE of scale and shape parameters of weibull distribution. Also a new type of parameter estimation, named inverse estimation, is introdued for both shape and scale parameters of weibull distribution which is used from order statistics properties in it. We use simulations and study the biases a...
متن کاملDesigning a Reliable Distribution Network with Facility Fortification and Transshipment under Partial and Complete Disruptions
This paper designs a reliability distribution network with limited capacity under partial and complete facility disruptions. To increase the reliability of the distribution network, a new mixed integer linear programing model is developed by considering multiple mitigation strategies including diversification, fortification, and transshipment. The distribution network constitutes of reliable di...
متن کاملInterval linear regression
In this paper, we have studied the analysis an interval linear regression model for fuzzy data. In section one, we have introduced the concepts required in this thesis and then we illustrated linear regression fuzzy sets and some primary definitions. In section two, we have introduced various methods of interval linear regression analysis. In section three, we have implemented nu...
متن کاملOPTIMUM GENERALIZED COMPOUND LINEAR PLAN FOR MULTIPLE-STEP STEP-STRESS ACCELERATED LIFE TESTS
In this paper, we consider an i.e., multiple step-stress accelerated life testing (ALT) experiment with unequal duration of time . It is assumed that the time to failure of a product follows Rayleigh distribution with a log-linear relationship between stress and lifetime and also we assume a generalized Khamis-Higgins model for the effect of changing stress levels. Taking into account that the...
متن کاملAn Investigation into the Effect of CEO’s Perceptual Biases on Investment Efficiency and Financing Constraints of the Iranian Listed Firms
Efficient market hypothesis predicts that capital markets are beset with cer-tain biases which result from wrong estimation, and negatively influence shareholders’ expectations for higher returns, which in turn affects invest-ment efficiency, financial constraints and corporate performance efficacy in competitive markets, and eventually mitigates firm value. The present study aims at examining ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012