On immunity against Biham and Shamir's “differential cryptanalysis”
Information Processing Letters
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Future Generation Computer Systems
Hi-index | 0.00 |
The existing block encryption algorithms have been designed for the encryption key value to be unchanged and applied to the round functions of each block, and enciphered. Therefore, it has such a weak point that the plain text or encryption key could be easily exposed by differential cryptanalysis or linear cryptanalysis, both are the most powerful methods for decoding block encryption of a round--repeating structure. In order to cope with this weak point, an encryption algorithm using a more efficient key should be designed.In this paper, a block encryption algorithm which is designed for each encryption key value to be applied to each round block with a different value is proposed. This algorithm needs a short processing time in encryption and decryption, has a high intensity, can apply to electronic commerce and various applications of data protection.