2009
DOI: 10.1080/01611190802653228
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(31 citation statements)
references
References 34 publications
(57 reference statements)
0
31
0
Order By: Relevance
“…It is clear from the table that the LAP of the proposed S-boxes is low, while their NL and AC are high enough to resist the linear attacks efficiently. Note that the average value of LAP of the proposed S-boxes is 0.1445 which is less than that of the S-boxes in [21,22,27,31], while their average NL and AC are 106 and 254 which are higher than that of [20,26,27,29,[31][32][33] and [28,30,31], respectively. This implies that the proposed method is capable of generating S-boxes with high security against linear attacks than some of the listed S-boxes.…”
Section: Linear Attacksmentioning
confidence: 83%
See 1 more Smart Citation
“…It is clear from the table that the LAP of the proposed S-boxes is low, while their NL and AC are high enough to resist the linear attacks efficiently. Note that the average value of LAP of the proposed S-boxes is 0.1445 which is less than that of the S-boxes in [21,22,27,31], while their average NL and AC are 106 and 254 which are higher than that of [20,26,27,29,[31][32][33] and [28,30,31], respectively. This implies that the proposed method is capable of generating S-boxes with high security against linear attacks than some of the listed S-boxes.…”
Section: Linear Attacksmentioning
confidence: 83%
“…We generated the S-boxes Tables 2-4, respectively. A comparison of the experimental results with the strongest S-boxes generated by the algorithms in [20][21][22][26][27][28][29][30][31][32][33][34] is also conducted in this section.…”
Section: Security Analysismentioning
confidence: 99%
“…In archetypal and modern cryptography S-boxes are typically constructed over finite Galois fields F 2 m , for 2 ≤ m ≤ 8, such as AES S-box, residue prime S-box Hussain et al (2011), Gray S-box Tran et al (2008), APA S-box Cui and Cao (2007), S 8 AES S-box, Skipjack S-box Kim and Phan (2009), Xyi S-box Yi et al (2002) and perfect nonlinear S-box Nyberg (1991).…”
Section: Introductionmentioning
confidence: 99%
“…They have been used to analyze many ciphers and should be taken into consideration for designing a new cipher scheme [6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%