نتایج جستجو برای: differential attack

تعداد نتایج: 363211  

Journal: :IACR Cryptology ePrint Archive 2011
Hongbo Yu Jiazhe Chen Keting Jia Xiaoyun Wang

The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). In this paper, we combine two short differential paths to a long differential path using the modular differential technique. And we present the semi-free start near-collision...

2001
Gilles Piret Jean-Jacques Quisquater

This paper shows a surprising similarity between the construction of, respectively, impossible differentials and square distinguishers. This observation is illustrated by comparing two attacks on IDEA (Biham & al., FSE’99 [2], Nakahara & al., 2001 [7]). Using this similarity, we also derive a 16-round square distinguisher on Skipjack, directly based on the impossible differential attack present...

قریشی زاده, سید محمد علی ,

Psychiatric disorders are very prevalent in epilepsy, 30 to 50 percent of epileptic patients suffer from psychiatric problems. On the other hand, many psychiatric disorders such as dissociative disorder, sleep disorder, impulse control disorder and cyclic disorders have clinical features like epilepsy. Therefore, differential dagnosis is very important in dealing with epilepsy. Epilepsy has man...

2006
Thomas Baignères Matthieu Finiasz

We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the advantage of the best d-limited adaptive distinguisher, for any value of d. Using results from the decorrelation theory, we extend these results to the whole KFC construction. To the best of our knowledge, KFC is the fir...

2002
Eli Biham Orr Dunkelman Nathan Keller

Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linear relations. In 1994, Langford and Hellman showed that both kinds of analysis can be combined together by a technique called differential-linear cryptanalysis, in which the differential part creates a linear approxima...

2013
Bariş Ege Amitabh Das Lejla Batina Ingrid Verbauwhede

Test compression schemes have been claimed to provide a certain level of security against scan-based side-channel attacks. To mitigate these attacks, a number of scan attack countermeasures are proposed in the literature. Recently, a new differential scan attack (DSA) is proposed which focuses on the S-box outputs rather than the S-box inputs as in previous attacks. In this paper, a systematic ...

1997
Lars R. Knudsen

In this paper we give a short overview of the state of the art of secret key block ciphers. We focus on the main application of block ciphers, namely for encryption. The most important known attacks on block ciphers are linear cryptanalysis and differential cryptanalysis. Linear cryptanalysis makes use of so-called linear hulls i.e., the parity of a subset of plaintext bits which after a certai...

2000
Dong Hyeon Cheon Seokhie Hong Sangjin Lee Sung Jae Lee Kyung Hwan Park Seonhee Yoon

Vaudenay[1] proposed a new way of protecting block ciphers against classes of attacks, which was based on the notion of decorrelation. He also suggested two block cipher families COCONUT and PEANUT. Wagner[2] suggested a new differential-style attack called boomerang attack and cryptanalyzed COCONUT'98. Cheon[3] suggested a new block cipher DONUT which was made by two pairwise perfect decorrela...

Journal: :IACR Cryptology ePrint Archive 2017
Victor Cauchois Clément Gomez Reynald Lercier

We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mixed-Integer Linear Programming approach. Together with the SuperSBox description, this allows us to build a rebound attack with a 6-round inbound phase whereas classical rebound attacks have 4-round...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید