On the Design of SP Networks From an Information Theoretic Point of View

نویسندگان

  • M. Sivabalan
  • Stafford E. Tavares
  • Lloyd E. Peppard
چکیده

Abstract : The cryptographic strength of an SP network depends crucially on the strength of its substitution boxes (S-boxes). In this paper we use the concept of information leakage to evaluate the strength of Sboxes and SP networks. We define a n equivalence class on n x n S-boxes that is invariant in information leakage. Simulation results for a 16x 16 SP network suggest that after a sufficient number of rounds the distribution of the output XOR in the SP network looks random. We further present simulation results to show that the information leakage for a n SP network diminishes more rapidly with the number of rounds when the S-boxes are cryptographically strong.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Information-Theoretic Discussion of Convolutional Bottleneck Features for Robust Speech Recognition

Convolutional Neural Networks (CNNs) have been shown their performance in speech recognition systems for extracting features, and also acoustic modeling. In addition, CNNs have been used for robust speech recognition and competitive results have been reported. Convolutive Bottleneck Network (CBN) is a kind of CNNs which has a bottleneck layer among its fully connected layers. The bottleneck fea...

متن کامل

A Survey of Librarians' Perspectives on Marketing Library Services Using Social Media in Tehran, Iran, and Shahid Beheshti Universities of Medical Sciences

Background and Aim: The present study has examined librarians' views on the marketing of library services using social media as well as the applications, benefits, and challenges of their use in Tehran, Iran, and Shahid Beheshti Universities of Medical Sciences.  Materials and Methods: This research was a descriptive and applied survey and was conducted in 2019. The data collection tool was a ...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Negative Consequences of Using Social Networks at the Workplace from the Point of View of the Sports and Youth Departments Staff

Background. Nowadays, employees' use of social networks at the workplace is increasing, which creates opportunities and challenges. Objectives. The current study aimed at investigating the negative consequences of the use of social networks at the workplace from the viewpoint of the employees of the sports and youth departments. Methods. The current descriptive survey was conducted on Golesta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992