Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Distinguishing Attacks on SOBER-t16 and t32
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A New S-Box Structure to Increase Complexity of Algebraic Expression for Block Cipher Cryptosystems
ICCTD '09 Proceedings of the 2009 International Conference on Computer Technology and Development - Volume 02
Improved linear distinguishers for SNOW 2.0
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Distinguishing attack on SOBER-128 with linear masking
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
In this paper, two stream ciphers, SOBER-t32 and SNOW 2.0 are used to generate sequences of pseudo random numbers. The original S-Boxes of these ciphers are replaced by Skipjack, IRSC, AES-Rijndael S-Box, and variants of AES-Rijndael S-Boxes. Pseudo-random sequences generated by SOBER-t32 and SNOW 2.0 using these S-Boxes are then tested by statistical test suite and analyzed by linear distinguishing cryptanalysis for randomness properties. The results show that these S-Boxes do not have much contribution to the statistical randomness of the pseudo-sequences but play significant roles on the nonlinearity of the ciphers. Hence, affect the randomness of sequences in cryptanalysis aspect.