Journal ArticleDOI
Avalanche characteristics of substitution-permutation encryption networks
TLDR
The results presented in this paper demonstrate that the avalanche behavior of encryption networks can be improved by using larger S- boxes and it is shown that increasing the diffusion properties of the S-boxes or replacing the permutations by diffusive linear transformations is effective in improving the network avalanche characteristics.Abstract:
This paper develops analytical models for the avalanche characteristics of a class of block ciphers usually referred to as substitution-permutation encryption networks or SPNs. An SPN is considered to display good avalanche characteristics if a one bit change in the plaintext input is expected to result in close to half the ciphertext output bits changing. Good avalanche characteristics are important to ensure that a cipher is not susceptible to statistical attacks and the strength of an SPN's avalanche characteristics may be considered as a measure of the randomness of the ciphertext. The results presented in this paper demonstrate that the avalanche behavior of encryption networks can be improved by using larger S-boxes. As well, it is shown that increasing the diffusion properties of the S-boxes or replacing the permutations by diffusive linear transformations is effective in improving the network avalanche characteristics. >read more
Citations
More filters
Journal ArticleDOI
Fault Analysis-Based Logic Encryption
Jeyavijayan Rajendran,Huan Zhang,Chi Zhang,Garrett S. Rose,Youngok Pino,Ozgur Sinanoglu,Ramesh Karri +6 more
TL;DR: This work relates logic encryption to fault propagation analysis in IC testing and develop a fault analysis-based logic encryption technique that enables a designer to controllably corrupt the outputs.
Proceedings ArticleDOI
Security analysis of integrated circuit camouflaging
TL;DR: The feasibility of identifying the functionality of camouflaged gates is analyzed and techniques to make the dummy contact-based IC camouflaging technique resilient to reverse engineering are proposed.
Journal ArticleDOI
A resource-efficient encryption algorithm for multimedia big data
TL;DR: The developed encryption algorithm has higher Avalanche Effect and for instance, AES in the proposed system has an Avalanche Effect of %52.50, therefore, such system is able to secure the multimedia big data against real-time attacks.
Proceedings ArticleDOI
Logic encryption: a fault analysis perspective
TL;DR: This work relates logic encryption to fault propagation analysis in IC testing and develop a fault analysis based logic encryption technique that achieves 50% Hamming distance between the correct and wrong outputs (ideal case) when a wrong key is applied.
Proceedings ArticleDOI
Low cost concurrent error detection for the advanced encryption standard
TL;DR: A new low-cost concurrent checking method for the advanced encryption standard (AES) encryption algorithm, where the parity of the 128-bit input is determined and modified step-by-step according to the processing steps of the AES encryption.
References
More filters
Journal ArticleDOI
An Introduction to Probability Theory and Its Applications
David A. Freedman,William Feller +1 more
An Introduction To Probability Theory And Its Applications
TL;DR: A First Course in Probability (8th ed.) by S. Ross is a lively text that covers the basic ideas of probability theory including those needed in statistics.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI
Linear cryptanalysis method for DES cipher
TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.