FPGA-Based High-Performance Computing Platform for Cryptanalysis of AES Algorithm
Citations
1 citations
1 citations
1 citations
Cites background from "FPGA-Based High-Performance Computi..."
...Also the security ratings of the proposed BC over the methods of LDC are calculated....
[...]
...Also the development and cost reduction of ICT positively affects the effectiveness of cryptanalysis, one of the most effective methods of which is linear and differential cryptanalysis (LDC) [6-8]....
[...]
...Accorfing to (9) – (14) formulas the parameters upper bounds values, characterizing this BC practical security against LDC methods are calculated: 142− = = , 4r = , 9MB = – 294( ) 2EDP − , 294( ) 2ELP − and number of round keys 9r = ....
[...]
...On the basis of paper [9], for the proposed method analytical upper bounds of the parameters that characterize its practical security against cyberattacks of LDC are obtained as following: ( ) 2 1 2 1 M M r B r B EDP + + , (9) ( ) 2 1 2 1 M M r B r B ELP + + , (10) where ( )EDP is the average probability of differential characteristic , ( )ELP is the average probability of linear characteristic , MB is M matrix branching index, and the parameters , , , are defined via the following formulas: ( ) ( ) max , : , \ 0 , 0, 1js td V j b = − , (11) ( ) ( ) max , : , \ 0 , 0, 1js t tl V V j b = − , (12) ( ) ( ) 1 1 0 max , : , \ 0j b s t j b d V − − = = , (13) ( ) ( ) 1 1 0 max , : , \ 0j b s t t j b l V V − − = = ....
[...]
...At the same time, analytical upper bounds of parameters characterized practical security of proposed BC against LDC were calculated....
[...]
References
3,444 citations
2,140 citations
543 citations
104 citations
95 citations