Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Jongsung-
dc.contributor.authorLee, Changhoon-
dc.contributor.authorSung, Jaechul-
dc.contributor.authorHong, Seokhie-
dc.contributor.authorLee, Sangjin-
dc.contributor.authorLim, Jongin-
dc.date.accessioned2021-09-09T04:05:29Z-
dc.date.available2021-09-09T04:05:29Z-
dc.date.created2021-06-10-
dc.date.issued2008-10-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/122664-
dc.description.abstractThe design and analysis of block ciphers is an established field of study which has seen significant progress since the early 1990s. Nevertheless, what remains on an interesting direction to explore in this area is to design block ciphers with provable security against powerful known attacks such as differential and linear cryptanalysis. In this paper we introduce seven new block cipher structures, named Feistel-variant A, B, CLEFIA and MISTY-FO-variant A, B, C, D structures, and show that these structures are provably resistant against differential cryptanalysis. The main results of this paper are that the average differential probabilities over at least 2 rounds of Feistel-variant A structure and I round of Feistel-variant B structure are both upperbounded by p(2), while the average differential probabilities over at least 5 rounds of CLEFIA, MISTY-FO-variant A, B, C and D structures are upperbounded by p(4) + 2p(5), p(4), p(4), 2P(4) and 2P(4), respectively, if the maximum differential probability of a round F function is p. We also give provable security for the Feistel-variant A, B and CLEFIA structures against linear cryptanalysis. Our results are attained under the assumption that all of components in our proposed structures are bijective. We expect that our results are useful to design block ciphers with provable security against differential and linear cryptanalysis.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectLINEAR CRYPTANALYSIS-
dc.titleSeven New Block Cipher Structures with Provable Security against Differential Cryptanalysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.contributor.affiliatedAuthorLim, Jongin-
dc.identifier.doi10.1093/ietfec/e91-a.10.3047-
dc.identifier.scopusid2-s2.0-73349096364-
dc.identifier.wosid000260400600047-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E91A, no.10, pp.3047 - 3058-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE91A-
dc.citation.number10-
dc.citation.startPage3047-
dc.citation.endPage3058-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusLINEAR CRYPTANALYSIS-
dc.subject.keywordAuthorprovable security-
dc.subject.keywordAuthordifferential cryptanalysis-
dc.subject.keywordAuthorlinear cryptanalysis-
dc.subject.keywordAuthorFeistel-
dc.subject.keywordAuthorCLEFIA-
dc.subject.keywordAuthorMISTY-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE