搜索结果: 1-15 共查到“军事学 linear cryptanalysis”相关记录43条 . 查询时间(0.151 秒)
On Non-Monotonicity of the Success Probability in Linear Cryptanalysis
Linear cryptanalysis success probability non-monotonicity
font style='font-size:12px;'>
2018/5/28
Like any other cryptanalytic attack, the success rate of a linear attack is expected to improve as more data becomes available. Bogdanov and Tischhauser (FSE 2013) made the rather surprising claim tha...
Related-Key Linear Cryptanalysis on SIMON
related-key attack linear cryptanalysis linear key schedule
font style='font-size:12px;'>
2018/3/7
We present a general framework of the related-key linear attack that can be applied to a class of block ciphers including the key-alternating iterative ones with linear or affine key schedules. In con...
Separable Statistics and Multidimensional Linear Cryptanalysis
block ciphers multidimensional linear cryptanalysis separable statistics
font style='font-size:12px;'>
2017/10/12
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a number of new ideas. Firstly, formulae is given to compute approximate multidimensional distributions o...
Linear Cryptanalysis of DES with Asymmetries
Linear cryptanalysis DES mixture models
font style='font-size:12px;'>
2017/9/21
Linear cryptanalysis of DES, proposed by Matsui in 1993, has had a seminal impact on symmetric-key cryptography, having seen massive research efforts over the past two decades. It has spawned many var...
Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses
multidimensional linear cryptanalysis multiple linear cryptanalysis chi-squared distribution
font style='font-size:12px;'>
2017/8/1
This work considers statistical analysis of attacks on block ciphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypothes...
The Security of SIMON-like Ciphers Against Linear Cryptanalysis
SIMON SIMECK
font style='font-size:12px;'>
2017/6/22
In the present paper, we analyze the security of SIMON-like ciphers against linear cryptanalysis. First, an upper bound is derived on the squared correlation of SIMON-like round function. It is shown ...
Another Look at Success Probability in Linear Cryptanalysis
linear cryptanalysis success probability data complexity
font style='font-size:12px;'>
2017/5/8
This work studies the success probability of linear cryptanalysis. Complete expressions for the success probability are obtained using two different approaches, namely the order statistics and the hyp...
Linear Cryptanalysis Using Low-bias Linear Approximations
Linear cryptanalysis Multiple linear cryptanalysis Multi-key linear cryptanalysis
font style='font-size:12px;'>
2017/3/6
This paper deals with linear approximations having absolute bias smaller than 2−n22−n2 which were previously believed to be unusable for a linear attack. We show how a series of observatio...
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Linear Cryptanalysis Key Schedule Hypothesis of Independent Round Keys
font style='font-size:12px;'>
2017/2/23
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers. We examine in a step by step ma...
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes
parity check linear cryptanalysis linear characteristics
font style='font-size:12px;'>
2017/2/20
We investigate the effect of inserting extra linearity in the Data Encryption Standard (DES) through appropriate singular linear encodings of the output of the individual S-boxes. More specifically, w...
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT
linear cryptanalysis multivariate multidimensional cryptanalysis
font style='font-size:12px;'>
2016/7/4
Extensions of linear cryptanalysis making use of multiple
approximations such as multidimensional linear cryptanalysis are an
important tool in symmetric-key cryptanalysis, among others being respon...
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis
Bent Function;Galois ring, Non Linearity
font style='font-size:12px;'>
2016/2/23
Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construct new class of bent f...
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
CLEFIA Integral attack Zero-correlation linear cryptanalysis
font style='font-size:12px;'>
2016/2/23
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended
cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight
cryptography. In this pa...
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
linear cryptanalysis authenticated encryption automated tools
font style='font-size:12px;'>
2016/1/27
Differential and linear cryptanalysis are the general purpose
tools to analyze various cryptographic primitives. Both techniques have
in common that they rely on the existence of good differential o...
Improved Slender-set Linear Cryptanalysis
block cipher linear cryptanalysis PRESENT-like
font style='font-size:12px;'>
2016/1/26
In 2013, Borghoff et al. introduced a slender-set linear cryptanalysis
on PRESENT-like ciphers with key-dependent secret S-boxes. In
this paper, we propose an improved slender-set linear attack to P...