Book ChapterDOI
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64
Nick D. Goots,Boris V. Izotov,Alexander A. Moldovyan,Nick A. Moldovyan +3 more
- pp 449-452
Reads0
Chats0
TLDR
Performed security estimation has shown that twelve-round cipher SPECTR-H64 is secure against differential attack and the extension box is a critical element of this cipher.Abstract:
Performed security estimation has shown that twelve-round cipher SPECTR-H64 is secure against differential attack and the extension box is a critical element of this cipher. A modified eight-round version SPECTR-H64 + is proposed.read more
Citations
More filters
Cryptanalysis of Block Ciphers
TL;DR: This thesis proposes a new extension of differential cryptanalysis, which is called the impossible boomerang attack, and describes the early abort technique for (related-key) impossible differential crypt analysis and rectangle attacks.
Book ChapterDOI
On Cipher Design Based on Switchable Controlled Operations
TL;DR: The present invention describes the identification, purification, recombinant production and characterization of novel O-fucosyltransferase enzymes.
Book ChapterDOI
Related-Key attacks on DDP based ciphers: CIKS-128 and CIKS-128H
TL;DR: In this paper, related-key differential attacks on full-round CIKS-128 and CIKS-128H are presented, with probability 2 −−36 and 2−−35.4.
Book ChapterDOI
Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b
TL;DR: These works are the first known attacks on Cobra-S128 and Cobra-F64, a 128-bit and 64-bit iterated block ciphers based on DDPs based on which several structural properties are derived and used to devise key recovery attacks.
Book ChapterDOI
Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1
TL;DR: In this paper, the authors show an attack on full-round SPECTR H64 and CIKS-1 using related key differential characteristic, which is based on data-dependent rotation with simple key schedule.
References
More filters
Journal ArticleDOI
A cipher based on data-dependent permutations
TL;DR: Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers and their application in the cipher CIKS-1 is considered.
BookDOI
Information Assurance in Computer Networks
TL;DR: A genetic classifier-based intrusion detection system, which can provide active detection and automated responses during intrusions, and evolve set of decision rules based on the significance of monitored parameters in Unix environment is described.
Book ChapterDOI
Fast Encryption Algorithm Spectr-H64
TL;DR: This paper describes a fast hardware-oriented 64-bit block cipher SPECTR-H64 based on combination of the data-dependent permutations and data- dependent transformation of subkeys.
Book ChapterDOI
Linear cryptanalysis on SPECTR-H64 with higher order differential property
TL;DR: In this article, the authors used the property of controlled permutation boxes to find linear equations of SPECTR-H64 and constructed the fourth-order differential structure using the property that the algebraic degree of the function G is 3.