Likelihood Estimation for Block Cipher Keys

نویسندگان

  • Sean Murphy
  • Fred Piper
  • Michael Walker
  • Peter Wild
چکیده

In this paper we give a general framework for the analysis of block ciphers using the statistical technique of likelihood estimation We show how various recent successful cryptanalyses of block ciphers can be regarded in this framework By analysing the SAFER block cipher in this framework we expose a cryptographic weakness of that cipher

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

A Traceable Block Cipher

In this paper we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys providing distinct descriptions of the same instance of the block cipher. But it is computationally difficult, given one or even up to k equivalent keys, to recover the so called meta-key from which they were derived, or t...

متن کامل

Weak Keys of CRYPTON

The block cipher CRYPTON is a candidate proposal for the AES standard. In this report we describe a class of 232 weak keys. This is mainly a consequence of the use of linear operations in the key schedule. These weak keys especially have consequences for the use of CRYPTON in certain hash function constructions.

متن کامل

ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware

We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardware implementations of ICEBERG allow to change the key at every clock cycle without any performance loss and its round keys are derived “on-the-fly...

متن کامل

Key Generators Can Strengthen Block Ciphers

The notion of key generators is introduced to symmetric cryptography. Key generators help eliminate the dependence of a block cipher’s security on a single, static key. If one of the dynamic keys is leaked to the adversary, then this compromise does not reveal future keys and prior keys used by the block cipher to encrypt distinct blocks of plaintext. A practical, key generator updating algorit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994