A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the distribution of characteristics in bijective mappings
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the security of the IDEA block cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Markov ciphers and alternating groups
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
On Maximum Non-averaged Differential Probability
SAC '98 Proceedings of the Selected Areas in Cryptography
SAC '98 Proceedings of the Selected Areas in Cryptography
SAC '98 Proceedings of the Selected Areas in Cryptography
Guesswork and Variation Distance as Measures of Cipher Security
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Security of E2 against Truncated Differential Cryptanalysis
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Markov Truncated Differential Cryptanalysis of Skipjack
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Controlled Operations as a Cryptographic Primitive
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
On the Design of SP Networks From an Information Theoretic Point of View
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Provable Security Against Differential Cryptanalysis
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Iterative Characteristics of DES and s²-DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers
ECMAST '99 Proceedings of the 4th European Conference on Multimedia Applications, Services and Techniques
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Improved Differential Attacks on RC5
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Security of a Wide Trail Design
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Enhancing Differential-Linear Cryptanalysis
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Securing Internet Electronic Mail
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
StReAm: Object-Oriented Programming of Stream Architectures Using PAM-Blox
FPL '00 Proceedings of the The Roadmap to Reconfigurable Computing, 10th International Workshop on Field-Programmable Logic and Applications
8 Gigabits per Second Implementation of the IDEA Cryptographic Algorithm
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
On the Design and Security of RC2
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A Revised Version of Crypton - Crypton V1.0
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Mod n Cryptanalysis, with Applications Against RC5P and M6
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
On the Decorrelated Fast Cipher (DFC) and Its Theory
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Stochastic Cryptanalysis of Crypton
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Flaws in Differential Cryptanalysis of Skipjack
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Efficient Algorithms for Computing Differential Properties of Addition
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
IDEA: A Cipher For Multimedia Architectures?
SAC '98 Proceedings of the Selected Areas in Cryptography
Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Differential Cryptanalysis of Q
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Concurrent Error Detection in Block Ciphers
ITC '00 Proceedings of the 2000 IEEE International Test Conference
Group theoretic properties of Rijndael-like ciphers
Discrete Applied Mathematics
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Differential cryptanalysis mod 232 with applications to MD5
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
PRINTcipher: a block cipher for IC-printing
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Multi-trail statistical saturation attacks
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Distinguishing distributions using Chernoff information
ProvSec'10 Proceedings of the 4th international conference on Provable security
Accurate estimates of the data complexity and success probability for various cryptanalyses
Designs, Codes and Cryptography
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure
Cryptography and Communications
Multiple differential cryptanalysis: theory and practice
FSE'11 Proceedings of the 18th international conference on Fast software encryption
A cryptanalysis of PRINTcipher: the invariant subspace attack
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Combining compression functions and block cipher-based hash functions
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
KFC - The Krazy Feistel Cipher
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
New cryptanalytic results on IDEA
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Functional correctness proofs of encryption algorithms
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Solving systems of differential equations of addition
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Near optimal algorithms for solving differential equations of addition with batch queries
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Pseudorandom permutation families over abelian groups
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Non-randomness of the full 4 and 5-pass HAVAL
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Faster variants of the MESH block ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Understanding two-round differentials in AES
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Proving the security of AES substitution-permutation network
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Narrow-Bicliques: cryptanalysis of full IDEA
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
The design and the security concept of a collaborative whiteboard
Computer Communications
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Differential cryptanalysis of reduced-round ICEBERG
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A Novel Color Image Hiding Scheme Using Block Truncation Coding
Fundamenta Informaticae
The 128-bit blockcipher CLEFIA
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
A model for structure attacks, with applications to PRESENT and serpent
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
A methodology for differential-linear cryptanalysis and its applications
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Differential analysis of the LED block cipher
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Differential entropy analysis of the IDEA block cipher
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
This paper considers the security of iterated block ciphers against the differential cryptanalysis introduced by Biham and Shamir. Differential cryptanalysis is a chosen-plaintext attack on secret-key block ciphers that are based on iterating a cryptographically weak function r times (e.g., the 16-round Data Encryption Standard (DES)). It is shown that the success of such attacks on an r-round cipher depends on the existence of (r-1)-round differentials that have high probabilities, where an i-round differential is defined as a couple (α, β) such that a pair of distinct plaintexts with difference α can result in a pair of i-th round outputs that have difference β, for an appropriate notion of "difference". The probabilities of such differentials can be used to determine a lower bound on the complexity of a differential cryptanalysis attack and to show when an r-round cipher is not vulnerable to such attacks. The concept of "Markov ciphers" is introduced for iterated ciphers because of its significance in differential cryptanalysis. If an iterated cipher is Markov and its round subkeys are independent, then the sequence of differences at each round output forms a Markov chain. It follows from a result of Biham and Shamir that DES is a Markov cipher. It is shown that, for the appropriate notion of "difference", the Proposed Encryption Standard (PES) of Lai and Massey, which is an 8-round iterated cipher, is a Markov cipher, as are also the mini-version of PES with block length 8, 16 and 32 bits. It is shown that PES(8) and PES(16) are immune to differential cryptanalysis after sufficiently many rounds. A detailed cryptanalysis of the full-size PES is given and shows that the very plausibly most probable 7-round differential has a probability about 2-58. A differential cryptanalysis attack of PES(64) based on this differential is shown to require all 264 possible encryptions. This cryptanalysis of PES suggested a new design principle for Markov ciphers, viz., that their transition probability matrices should not be symmetric. A minor modification of PES, consistent with all the original design principles, is proposed that satisfies this new design criterion. This modified cipher, called Improved PES (IPES), is described and shown to be highly resistant to differential cryptanalysis.