scispace - formally typeset
Journal ArticleDOI

Avalanche characteristics of substitution-permutation encryption networks

TLDR
The results presented in this paper demonstrate that the avalanche behavior of encryption networks can be improved by using larger S- boxes and it is shown that increasing the diffusion properties of the S-boxes or replacing the permutations by diffusive linear transformations is effective in improving the network avalanche characteristics.
Abstract
This paper develops analytical models for the avalanche characteristics of a class of block ciphers usually referred to as substitution-permutation encryption networks or SPNs. An SPN is considered to display good avalanche characteristics if a one bit change in the plaintext input is expected to result in close to half the ciphertext output bits changing. Good avalanche characteristics are important to ensure that a cipher is not susceptible to statistical attacks and the strength of an SPN's avalanche characteristics may be considered as a measure of the randomness of the ciphertext. The results presented in this paper demonstrate that the avalanche behavior of encryption networks can be improved by using larger S-boxes. As well, it is shown that increasing the diffusion properties of the S-boxes or replacing the permutations by diffusive linear transformations is effective in improving the network avalanche characteristics. >

read more

Citations
More filters
Journal ArticleDOI

Fault Analysis-Based Logic Encryption

TL;DR: This work relates logic encryption to fault propagation analysis in IC testing and develop a fault analysis-based logic encryption technique that enables a designer to controllably corrupt the outputs.
Proceedings ArticleDOI

Security analysis of integrated circuit camouflaging

TL;DR: The feasibility of identifying the functionality of camouflaged gates is analyzed and techniques to make the dummy contact-based IC camouflaging technique resilient to reverse engineering are proposed.
Journal ArticleDOI

A resource-efficient encryption algorithm for multimedia big data

TL;DR: The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50, therefore, such system is able to secure the multimedia big data against real-time attacks.
Proceedings ArticleDOI

Logic encryption: a fault analysis perspective

TL;DR: This work relates logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique that achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied.
Proceedings ArticleDOI

Low cost concurrent error detection for the advanced encryption standard

TL;DR: A new low-cost concurrent checking method for the advanced encryption standard (AES) encryption algorithm, where the parity of the 128-bit input is determined and modified step-by-step according to the processing steps of the AES encryption.
References
More filters

An Introduction To Probability Theory And Its Applications

TL;DR: A First Course in Probability (8th ed.) by S. Ross is a lively text that covers the basic ideas of probability theory including those needed in statistics.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI

Linear cryptanalysis method for DES cipher

TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.