2018 International Conference on Advances in Communication and Computing Technology (ICACCT) 2018
DOI: 10.1109/icacct.2018.8529666
|View full text |Cite
|
Sign up to set email alerts
|

New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Furthermore, experimental results from the DC attacks were conferred as evidence of accepting the idea as outlined. Even though the first plan of DC attack was on DES [1,16], however, the extensive applicability of DC attacks to several other cryptographic algorithms thickened the superiority of DC attack techniques in the security inspection of all cryptographic algorithms [1,7,9,22,29]. Cryptologists developed technology based on techniques explicitly targeted at DC circumvention [6,7,9].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, experimental results from the DC attacks were conferred as evidence of accepting the idea as outlined. Even though the first plan of DC attack was on DES [1,16], however, the extensive applicability of DC attacks to several other cryptographic algorithms thickened the superiority of DC attack techniques in the security inspection of all cryptographic algorithms [1,7,9,22,29]. Cryptologists developed technology based on techniques explicitly targeted at DC circumvention [6,7,9].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Z'aba and Maarof [10] indicated that the superiorities of attacks were grounded in the principle of a DC attack. For instance, the impossible differential attack was utilized on the MixColumns transformation of an AES [10,29]. If a pair of plaintext varied only in one byte, then the reduced four rounds ciphertext of an AES would never be the same in the ciphertext byte positions: (0, 0), (1,3), (2, 2), (3, 1), (0, 1), (1, 0), (2, 3),(3, 2), (0, 2), (1, 1), (2, 0), (3,3) nor (0, 3), (1, 2), (2, 1), (3, 0) [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…We make the point that the major consequence of this exercise is with respect to implementation attacks; and this is precisely the perspective in which we have provisioned a compensation with the secure element as a trade-off in the efficient security algorithm for power constrained IoT devices. While a formal analysis of security protocols is on its own, an whole area of fertile research [31], according to [32], the security of an encryption scheme is usually measured through the application of different types of cryptanalysis methods. The security of the AES algorithm with respect to key length is based on its resistance against breakability by brute-force/exhaustive key search.…”
Section: A Cryptanalytic Overview Of the Consequence Of Aes Round Rementioning
confidence: 99%
“…Many articles were published about fault based attacks and side channel attacks on AES [14][15][16][17][18][19][20][21]. An improved version of related key impossible differential attack on AES-192 is given in [22]. Now the research on light weight block cipher has become a hot research topic in cryptography.…”
Section: Introductionmentioning
confidence: 99%