New Applications of Differential Bounds of the SDS Structure
نویسندگان
چکیده
In this paper, we present some new applications of the bounds for the differential probability of a SDS (Substitution-Diffusion-Substitution) structure by Park et al. at FSE 2003. Park et al. have applied their result on the AES cipher which uses the SDS structure based on MDS matrices. We shall apply their result to practical ciphers that use SDS structures based on {0, 1}-matrices of size n×n. These structures are useful because they can be efficiently implemented in hardware. We prove a bound on {0, 1}-matrices to show that they cannot be MDS and are almost-MDS only when n = 2, 3, or 4. Thus we have to apply Park’s result whenever {0, 1}-matrices where n ≥ 5 are used because previous results only hold for MDS and almost-MDS diffusion matrices. Based on our bound, we also show that the {0, 1}-matrix used in E2 is almost-optimal among {0, 1}matrices. Using Park’s result, we prove differential bounds for E2 and an MCrypton-like cipher, from which we can deduce their security against boomerang attack and some of its variants. At ICCSA 2006, Khoo and Heng constructed block cipher-based universal hash functions, from which they derived Message Authentication Codes (MACs) which are faster than CBC-MAC. Park’s result provides us with the means to obtain a more accurate bound for their universal hash function. With this bound, we can restrict the number of MAC’s performed before a change of MAC key is needed.
منابع مشابه
Coefficient bounds for a new class of univalent functions involving Salagean operator and the modified Sigmoid function
We define a new subclass of univalent function based on Salagean differential operator and obtained the initial Taylor coefficients using the techniques of Briot-Bouquet differential subordination in association with the modified sigmoid function. Further we obtain the classical Fekete-Szego inequality results.
متن کاملSolutions structure of integrable families of Riccati equations and their applications to the perturbed nonlinear fractional Schrodinger equation
Some preliminaries about the integrable families of Riccati equations and solutions structure of these equations in several cases are presented in this paper, then by using of definitions for fractional derivative we apply the new extended of tanh method to the perturbed nonlinear fractional Schrodinger equation with the kerr law nonlinearity. Finally by using of this method and solutions of Ri...
متن کاملThe exponential functions of central-symmetric $X$-form matrices
It is well known that the matrix exponential function has practical applications in engineering and applied sciences. In this paper, we present some new explicit identities to the exponential functions of a special class of matrices that are known as central-symmetric $X$-form. For instance, $e^{mathbf{A}t}$, $t^{mathbf{A}}$ and $a^{mathbf{A}t}$ will be evaluated by the new formulas in this par...
متن کاملImage Restoration Using A PDE-Based Approach
Image restoration is an essential preprocessing step for many image analysis applications. In any image restoration techniques, keeping structure of the image unchanged is very important. Such structure in an image often corresponds to the region discontinuities and edges. The techniques based on partial differential equations, such as the heat equations, are receiving considerable attention i...
متن کاملA NEW ANALYTICAL METHOD FOR SOLVING FUZZY DIFFERENTIAL EQUATIONS
In the literature, several numerical methods are proposed for solvingnth-order fuzzy linear differential equations. However, till now there areonly two analytical methods for the same. In this paper, the fuzzy Kolmogorov'sdifferential equations, obtained with the help of fuzzy Markov modelof piston manufacturing system, are solved by one of these analytical methodsand illustrated that the obtai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008