CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Ciphertex-only attack on Akelarre
Cryptologia
The Design of Rijndael
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Fast Software Encryption Functions
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Linear Cryptanalysis of Reduced Round Serpent
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
The boomerang attack on 5 and 6-round reduced AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
On quadratic approximations in block ciphers
Problems of Information Transmission
Hi-index | 0.00 |
This paper describes a linear analysis of Blowfish (a block cipher designed by B. Schneier in 1993), and Khufu (a cipher designed by R.C. Merkle in 1989). The nonlinear cipher components of these ciphers are key dependent, and thus, unknown to unauthorized entities. Nonetheless, we estimate the fraction of user keys that generate weak nonlinear components (namely, with large enough bias). As far as we are aware of this paper reports the first known-plaintext (and ciphertext-only) attacks on these ciphers.