Known Plaintext Cryptanalysis of Tree-structured Block Ciphers
نویسندگان
چکیده
In this Letter we examine the cryptanalysis of a class of block ciphers referred to as substitution-permutation networks or SPNs. Speciically, we present a novel attack applicable to tree-structured SPNs. Because it uses a known plaintext approach, the attack is preferable to previously outlined chosen plaintext attacks. As well, it is shown that the attack is applicable to networks which are simple extensions of tree-structured SPNs. Introduction: The concepts of \confusion" and \diiusion" introduced by Shannon 1] form the basis for a class of private key block ciphers referred to as substitution-permutation networks or SPNs. These networks, rst suggested by Feistel 2], encrypt by passing an N-bit data block through R rounds of substitutions followed by permutations of the bit positions. The substitutions are accomplished by dividing the block into small n-bit sub-blocks and using N=n n-bit mappings referred to as S-boxes.
منابع مشابه
Integral Cryptanalysis and Higher Order Differential Attack
Integral cryptanalysis and higher order differential attack are chosen(or known) plaintext attacks on block ciphers. These attacks have been developed independently and become widely used as strong tools to analyze the security of block ciphers. In this paper, basic idea of these attacks including brief historical comments is described. We give some recent applications of integral cryptanalysis...
متن کاملThe Biryukov-Demirci Attack on IDEA and MESH Ciphers
This report elaborates on an observation by Alex Biryukov on the computational graph of the IDEA cipher, and combines it with Demirci’s attack presented at SAC’2002. Further, this attack is also applied to reduced-round versions of the MESH block ciphers. Particular features of these attacks are: (i) they require only known-plaintext (such as in linear cryptanalysis); (ii) they trade-off the nu...
متن کاملCryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
In symmetric-key cryptography, two parties share a secret key K to encrypt messages using a cipher. Symmetric encryption techniques are used to efficiently encrypt data. Two common types of ciphers are commonly used nowadays: block ciphers and stream ciphers. Block ciphers encrypt blocks of data (typically 64 or 128 bits) in a fixed key-dependent way. The design of block ciphers is a well-studi...
متن کاملLinear Cryptanalysis of the SAFER Block Cipher Family
This paper presents a linear cryptanalytic attack against the SAFER family of block ciphers. Linear cryptanalysis is a statistical well-known-plaintext attack that explores (approximate) linear relations between plaintext, ciphertext and subkey bits. These linear relations apply only to certain key classes. The results show that by considering nonhomomorphic linear relations, more rounds of the...
متن کاملOverview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method
In this paper presents the Linear Cryptanalysis on S-DES and Symmetric Block Ciphers Using Hill Cipher Method. As a vehicle of demonstration of this concept, choose simple yet representative block ciphers such as computationally tractable versions of S-DES, for the studies. The attack presented in this paper is applicable to block structure independently of the key scheduling. The attack needs ...
متن کامل