New Applications of Differential Bounds of the SDS Structure

نویسندگان

  • Jiali Choy
  • Khoongming Khoo
چکیده

In this paper, we present some new applications of the bounds for the differential probability of a SDS (Substitution-Diffusion-Substitution) structure by Park et al. at FSE 2003. Park et al. have applied their result on the AES cipher which uses the SDS structure based on MDS matrices. We shall apply their result to practical ciphers that use SDS structures based on {0, 1}-matrices of size n×n. These structures are useful because they can be efficiently implemented in hardware. We prove a bound on {0, 1}-matrices to show that they cannot be MDS and are almost-MDS only when n = 2, 3, or 4. Thus we have to apply Park’s result whenever {0, 1}-matrices where n ≥ 5 are used because previous results only hold for MDS and almost-MDS diffusion matrices. Based on our bound, we also show that the {0, 1}-matrix used in E2 is almost-optimal among {0, 1}matrices. Using Park’s result, we prove differential bounds for E2 and an MCrypton-like cipher, from which we can deduce their security against boomerang attack and some of its variants. At ICCSA 2006, Khoo and Heng constructed block cipher-based universal hash functions, from which they derived Message Authentication Codes (MACs) which are faster than CBC-MAC. Park’s result provides us with the means to obtain a more accurate bound for their universal hash function. With this bound, we can restrict the number of MAC’s performed before a change of MAC key is needed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coefficient bounds for a new class of univalent functions involving Salagean operator and the modified Sigmoid function

We define a new subclass of univalent function based on Salagean differential operator and obtained the initial Taylor coefficients using the techniques of Briot-Bouquet differential subordination in association with the modified sigmoid function. Further we obtain the classical Fekete-Szego inequality results.

متن کامل

Solutions structure of integrable families of Riccati equations and their applications to the perturbed nonlinear fractional Schrodinger equation

Some preliminaries about the integrable families of Riccati equations and solutions structure of these equations in several cases are presented in this paper, then by using of definitions for fractional derivative we apply the new extended of tanh method to the perturbed nonlinear fractional Schrodinger equation with the kerr law nonlinearity. Finally by using of this method and solutions of Ri...

متن کامل

The exponential functions of central-symmetric $X$-form matrices

It is well known that the matrix exponential function has practical applications in engineering and applied sciences. In this paper, we present some new explicit identities to the exponential functions of a special class of matrices that are known as central-symmetric $X$-form. For instance, $e^{mathbf{A}t}$, $t^{mathbf{A}}$ and $a^{mathbf{A}t}$ will be evaluated by the new formulas in this par...

متن کامل

Image Restoration Using A PDE-Based Approach

 Image restoration is an essential preprocessing step for many image analysis applications. In any image restoration techniques, keeping structure of the image unchanged is very important. Such structure in an image often corresponds to the region discontinuities and edges. The techniques based on partial differential equations, such as the heat equations, are receiving considerable attention i...

متن کامل

A NEW ANALYTICAL METHOD FOR SOLVING FUZZY DIFFERENTIAL EQUATIONS

In the literature, several numerical methods are proposed for solvingnth-order fuzzy linear differential equations. However, till now there areonly two analytical methods for the same. In this paper, the fuzzy Kolmogorov'sdifferential equations, obtained with the help of fuzzy Markov modelof piston manufacturing system, are solved by one of these analytical methodsand illustrated that the obtai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008