2020
DOI: 10.1504/ijact.2020.107164
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic MDS diffusion layers with efficient software implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Additionally, in [33] Murphy et al presented a method for differential cryptanalysis of key-dependent S-boxes, outlining techniques for conducting cryptanalysis using such Sboxes. Some works have also focused on introducing dynamism to the diffusion layer [34], [35], [36], [37] of AES. For example, one proposal in [34] involves constructing a key-dependent diffusion layer using scalar multiplication and direct exponentiation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, in [33] Murphy et al presented a method for differential cryptanalysis of key-dependent S-boxes, outlining techniques for conducting cryptanalysis using such Sboxes. Some works have also focused on introducing dynamism to the diffusion layer [34], [35], [36], [37] of AES. For example, one proposal in [34] involves constructing a key-dependent diffusion layer using scalar multiplication and direct exponentiation.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, numerous research efforts focus on enhancing AES through animation. Some of these focus on proposing dynamic S-boxes for AES [28], [29], [30], [31], [32], [33], while others create dynamic MixColumn transformations for AES [34], [35], [36], [37]. Some studies animating both the S-boxes and the MixColumn transformation of AES are also of interest [38], [39], [40].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, with the AES block cipher, there is a variety of approaches to dynamize the AES block cipher to enhance its security. Some of these methods center on incorporating S-boxes in AES that depend on a secret key [20][21][22][23][24][25], while others work on creating key-dependent MixColumn transformations for AES [26][27][28]. Notably, there are studies exploring the dynamization of both AES's S-boxes and MixColumn [29], or the dynamization of all three transformations: S-Boxes, MixColumn, and ShiftRow, which have also received attention [30][31][32].…”
Section: Introductionmentioning
confidence: 99%
“…An idea presented in [27] includes the creation of a diffusion layer that relies on the encryption key, achieved through scalar multiplication and immediate exponentiation. In [28], the authors introduced a collection of binary matrices that can be employed to create dynamic matrices resembling AES and recursive MDS matrices.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, there is a rich literature on certain types of mixing layers. In particular, there have been many papers written about finding maximum-distance separable (MDS) mappings or near-MDS mappings with minimum implementation cost according to some metric, see, e.g., [28,37]. Building a good cipher starts with taking a good S-box and mixing layer and the rich cryptographic literature on these components provides us with ample choice.…”
Section: Introductionmentioning
confidence: 99%