2012
DOI: 10.2478/v10127-012-0046-4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks

Abstract: ABSTRACT. The strength of Rijndael-like ciphers to the truncated differential attack is considered. Theorems about the absence of effective truncated (byte) differential characteristics and effective truncated (byte) differentials for ciphers with sufficient number of rounds are proved.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
(10 reference statements)
0
3
0
Order By: Relevance
“…The first defect of the proposed approach is that only the version of the Rijndael-like cipher with the block size of m×m bytes is analyzed, but in practice other variants may also occur. The second defect is related to the fact that the used constraints on the probability of BDC from [12,13] were obtained for Rijndael-like ciphers that used the XOR-addition operation with a key, while in the Q transformation of the Kupyna algorithm, addition by modulo 2 64 is used. In some cases, these differences may lead to inaccurate results for the scheme → → ... a a of attack.…”
Section: Comparison With Known Results About Security Of Grostl-like mentioning
confidence: 99%
See 2 more Smart Citations
“…The first defect of the proposed approach is that only the version of the Rijndael-like cipher with the block size of m×m bytes is analyzed, but in practice other variants may also occur. The second defect is related to the fact that the used constraints on the probability of BDC from [12,13] were obtained for Rijndael-like ciphers that used the XOR-addition operation with a key, while in the Q transformation of the Kupyna algorithm, addition by modulo 2 64 is used. In some cases, these differences may lead to inaccurate results for the scheme → → ... a a of attack.…”
Section: Comparison With Known Results About Security Of Grostl-like mentioning
confidence: 99%
“…The scheme of difference transformation in terms of differential cryptanalysis is called the differential characteristic, or, as in the case of differential attacks on Rijndael-like ciphers, the byte differential characteristic (BDC). The work [12] is devoted to the analysis of BDCs, byte differentials and their probabilities for Rijndael-like ciphers. In [13], an attempt to generalize these results for block ciphers in general was made, and a model of ciphers provably secure against truncated differential attacks was proposed.…”
Section: рассматриваются две схемы организации коллизионных Rebound аmentioning
confidence: 99%
See 1 more Smart Citation