Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis

Authors
Kim, JongsungLee, ChanghoonSung, JaechulHong, SeokhieLee, SangjinLim, Jongin
Issue Date
10월-2008
Publisher
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
Keywords
provable security; differential cryptanalysis; linear cryptanalysis; Feistel; CLEFIA; MISTY
Citation
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E91A, no.10, pp.3047 - 3058
Indexed
SCIE
SCOPUS
Journal Title
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
Volume
E91A
Number
10
Start Page
3047
End Page
3058
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/122664
DOI
10.1093/ietfec/e91-a.10.3047
ISSN
0916-8508
Abstract
The design and analysis of block ciphers is an established field of study which has seen significant progress since the early 1990s. Nevertheless, what remains on an interesting direction to explore in this area is to design block ciphers with provable security against powerful known attacks such as differential and linear cryptanalysis. In this paper we introduce seven new block cipher structures, named Feistel-variant A, B, CLEFIA and MISTY-FO-variant A, B, C, D structures, and show that these structures are provably resistant against differential cryptanalysis. The main results of this paper are that the average differential probabilities over at least 2 rounds of Feistel-variant A structure and I round of Feistel-variant B structure are both upperbounded by p(2), while the average differential probabilities over at least 5 rounds of CLEFIA, MISTY-FO-variant A, B, C and D structures are upperbounded by p(4) + 2p(5), p(4), p(4), 2P(4) and 2P(4), respectively, if the maximum differential probability of a round F function is p. We also give provable security for the Feistel-variant A, B and CLEFIA structures against linear cryptanalysis. Our results are attained under the assumption that all of components in our proposed structures are bijective. We expect that our results are useful to design block ciphers with provable security against differential and linear cryptanalysis.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE