Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The Design of Rijndael
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Provable Security Against Differential Cryptanalysis
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Impossible Differential Cryptanalysis of CLEFIA
Fast Software Encryption
Distinguisher and Related-Key Attack on the Full AES-256
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Related-Key Cryptanalysis of the Full AES-192 and AES-256
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
The 128-bit blockcipher CLEFIA
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Hi-index | 0.00 |
In this paper, we have proposed two block cipher structures which can be considered as variants of SP-network and Generalized Feistel structure respectively. Our main idea is to improve the diffusion effect when mixing all the sub-blocks together in each round. We also show that compared with the original structures, our structures have several important advantages. Then we evaluate the security of our structures against main attacks by estimating the upper bounds for differential and linear probabilities, and also the maximum number of rounds for impossible differential. In the end, we present two example ciphers which are based on the structures proposed, and we also adopt several novel and state-of-the-art design techniques. Then by explaining the design rationales and evaluating the security of the example ciphers under main attack settings, we can conclude that both of our ciphers can achieve enough immunity against known attacks and also have high performances.