scispace - formally typeset
Journal ArticleDOI

New types of cryptanalytic attacks using related keys

Eli Biham
- 01 Dec 1994 - 
- Vol. 7, Iss: 4, pp 229-246
Reads0
Chats0
TLDR
It is shown that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockcips, and that DES is not vulnerable to the related keys attacks.

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Constraint Programming Models for Chosen Key Differential Cryptanalysis

TL;DR: This paper introduces Constraint Programming (CP) models to solve a cryptanalytic problem: the chosen key differential attack against the standard block cipher AES, and shows that Model 2 is much more efficient than Model 1, and that Chuffed is faster than Choco which is slower than Gecode on the hardest instances of this problem.
Book ChapterDOI

Khudra: A New Lightweight Block Cipher for FPGAs

TL;DR: Using these guidelines, a new block cipher Khudra based on the recursive Feistel structure is designed, which has a 64 bit block size and 80 bits of key and is implemented on low cost FPGAs.
Journal Article

A Unified Approach to Related-Key Attacks

TL;DR: In this article, the authors introduced a new framework and a generalization of the various flavors of related-key attacks, which allows for combining all the previous related key attacks into a complex, but much more powerful attack.
Journal ArticleDOI

BORON: an ultra-lightweight and low power encryption design for pervasive computing

TL;DR: BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role and it has a higher throughput as compared to other existing SP network ciphers.
Journal Article

LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption

TL;DR: A lightweight block cipher that supports 128bit block size with 128-, 192- and 256-bit keys, to conflrm with the Advanced Encryption Standard (AES) speciflcation.
References
More filters
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Book

Differential Cryptanalysis of the Data Encryption Standard

TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Journal ArticleDOI

Cryptography and Computer Privacy

Horst Feistel
- 01 May 1973 -