Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Impossible differential cryptanalysis using matrix method

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Jongsung-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorLim, Jongin-
dc.date.accessioned2021-09-08T04:35:19Z-
dc.date.available2021-09-08T04:35:19Z-
dc.date.created2021-06-11-
dc.date.issued2010-03-06-
dc.identifier.issn0012-365X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116819-
dc.description.abstractThe general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material from the outer rounds of block ciphers. Thus, impossible differentials are one of the crucial factors to see how much the underlying block ciphers are resistant to impossible differential cryptanalysis. In this article, we introduce a widely applicable matrix method to find impossible differentials of block cipher structures whose round functions are bijective. Using this method, we find various impossible differentials of known block cipher structures: Nyberg's generalized Feistel network, a generalized CAST256-like structure, a generalized MARS-like structure, a generalized RC6-like structure, Rijndael structures and generalized Skipjack-like structures. We expect that the matrix method developed in this article will be useful for evaluating the security of block ciphers against impossible differential cryptanalysis, especially when one tries to design a block cipher with a secure structure. (C) 2009 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectSECURITY-
dc.titleImpossible differential cryptanalysis using matrix method-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorLim, Jongin-
dc.identifier.doi10.1016/j.disc.2009.10.019-
dc.identifier.scopusid2-s2.0-72749105576-
dc.identifier.wosid000274126000003-
dc.identifier.bibliographicCitationDISCRETE MATHEMATICS, v.310, no.5, pp.988 - 1002-
dc.relation.isPartOfDISCRETE MATHEMATICS-
dc.citation.titleDISCRETE MATHEMATICS-
dc.citation.volume310-
dc.citation.number5-
dc.citation.startPage988-
dc.citation.endPage1002-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryMathematics-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordAuthorCryptanalysis-
dc.subject.keywordAuthorBlock ciphers-
dc.subject.keywordAuthorImpossible differential cryptanalysis-
dc.subject.keywordAuthorMatrix method-
dc.subject.keywordAuthorFeistel-
dc.subject.keywordAuthorRijndael-
dc.subject.keywordAuthorSkipjack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE