scispace - formally typeset
Search or ask a question

Showing papers on "Differential cryptanalysis published in 1989"


Proceedings ArticleDOI
R.A. Rueppel1
03 Oct 1989
TL;DR: A survey of the different approaches to the design of stream cipher systems is presented and examples are used to illustrate the results that can be obtained.
Abstract: Cipher systems are commonly subdivided into block ciphers and stream ciphers. In the application, block ciphers require, as their name indicates, large blocksizes. Contrastingly, stream ciphers can operate on data units as small as a bit or a character, a fact that has greatly contributed to their popularity. In this paper a survey of the different approaches to the design of stream cipher systems is presented. Examples are used to illustrate the results that can be obtained.

9 citations


Journal ArticleDOI
TL;DR: This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial intelligence techniques in the automated solution of ciphers in crypt-text-only attacks.
Abstract: This article reports the last of a series of experiments performed between 1984 and 1988 to explore the limits of artificial intelligence (AI) techniques in the automated solution of ciphers in crypt-text-only attacks. We started with simple substitution ciphers and went on to solve polyalphabetic ciphers, geometric transposition ciphers, and product ciphers that combined the last two techniques.

5 citations


Journal ArticleDOI
TL;DR: A correspondence between certain types of linear ciphers and projective planes is pointed out and a number of questions posed in [3] are answered.
Abstract: The purpose of this paper is to point out a correspondence between certain types of linear ciphers and projective planes. With the aid of this correspondence we are then able to answer a number of questions posed in [3].

2 citations


Journal ArticleDOI
TL;DR: A versatile and simple method to strengthen one-to-one enciphering transformations is presented, which can be an alternative way to superenciphering and stream encipherment and is particularly suited to digital implementation, both in software and in hardware.
Abstract: A versatile and simple method to strengthen one-to-one enciphering transformations is presented. This method, which can be an alternative way to superenciphering and stream encipherment, has some interesting properties and is particularly suited to digital implementation, both in software and in hardware.

1 citations


Journal ArticleDOI
TL;DR: An extension of the Morris Known Plaintext Attack is shown to permit complete cryptanalysis of a generalized Hagelin (M-209) cipher machine implemented electronically and modifications of the encrypting algorithm are suggested to defeat the attack.
Abstract: An extension of the Morris Known Plaintext Attack is shown to permit complete cryptanalysis of a generalized Hagelin (M-209) cipher machine implemented electronically. We then suggest modifications of the encrypting algorithm to defeat the attack.

1 citations