scispace - formally typeset
Book ChapterDOI

Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64

Reads0
Chats0
TLDR
Performed security estimation has shown that twelve-round cipher SPECTR-H64 is secure against differential attack and the extension box is a critical element of this cipher.
Abstract
Performed security estimation has shown that twelve-round cipher SPECTR-H64 is secure against differential attack and the extension box is a critical element of this cipher. A modified eight-round version SPECTR-H64 + is proposed.

read more

Citations
More filters

Cryptanalysis of Block Ciphers

TL;DR: This thesis proposes a new extension of differential cryptanalysis, which is called the impossible boomerang attack, and describes the early abort technique for (related-key) impossible differential crypt analysis and rectangle attacks.
Book ChapterDOI

On Cipher Design Based on Switchable Controlled Operations

TL;DR: The present invention describes the identification, purification, recombinant production and characterization of novel O-fucosyltransferase enzymes.
Book ChapterDOI

Related-Key attacks on DDP based ciphers: CIKS-128 and CIKS-128H

TL;DR: In this paper, related-key differential attacks on full-round CIKS-128 and CIKS-128H are presented, with probability 2 −−36 and 2−−35.4.
Book ChapterDOI

Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b

TL;DR: These works are the first known attacks on Cobra-S128 and Cobra-F64, a 128-bit and 64-bit iterated block ciphers based on DDPs based on which several structural properties are derived and used to devise key recovery attacks.
Book ChapterDOI

Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1

TL;DR: In this paper, the authors show an attack on full-round SPECTR H64 and CIKS-1 using related key differential characteristic, which is based on data-dependent rotation with simple key schedule.
References
More filters
Journal ArticleDOI

A cipher based on data-dependent permutations

TL;DR: Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers and their application in the cipher CIKS-1 is considered.
BookDOI

Information Assurance in Computer Networks

TL;DR: A genetic classifier-based intrusion detection system, which can provide active detection and automated responses during intrusions, and evolve set of decision rules based on the significance of monitored parameters in Unix environment is described.
Book ChapterDOI

Fast Encryption Algorithm Spectr-H64

TL;DR: This paper describes a fast hardware-oriented 64-bit block cipher SPECTR-H64 based on combination of the data-dependent permutations and data- dependent transformation of subkeys.
Book ChapterDOI

Linear cryptanalysis on SPECTR-H64 with higher order differential property

TL;DR: In this article, the authors used the property of controlled permutation boxes to find linear equations of SPECTR-H64 and constructed the fourth-order differential structure using the property that the algebraic degree of the function G is 3.