scispace - formally typeset
Search or ask a question
Topic

Differential cryptanalysis

About: Differential cryptanalysis is a research topic. Over the lifetime, 2131 publications have been published within this topic receiving 54681 citations.


Papers
More filters
Book
05 Apr 2015
TL;DR: The effects of weakly chosen password-keys on the security of block ciphers are examined to study the effects of an optimization heuristic cryptanalytic attack on block cipher.
Abstract: Block cipher algorithms are commonly used to secure confidential information in everyday user applications. However, it is quite common for ignorant users to use familiar dictionary words as their personal passwords. This research examines the effects of weakly chosen password-keys on the security of block ciphers. A new hybrid optimization heuristic cryptanalytic attack (tabu search and genetic algorithm) is used to conduct an intelligent key-search attack on classical ciphers and modern ciphers. The algorithm chosen to represent modern block ciphers is the advanced encryption standard (AES) algorithm. AES is an algebraic product cipher which combines elements of substitution and transposition. Therefore, the primarily aims of this paper is to study the effects of an optimization heuristic cryptanalytic attack on block cipher.

10 citations

Journal ArticleDOI
TL;DR: By adding 8 bits for each byte using a function and another mathematical function to position the bits in a binary tree and using its in-order tour, this cipher can be made protected.
Abstract: Transposition ciphers are stronger than simple substitution ciphers. However, if the key is short and the message is long, then various cryptanalysis techniques can be applied to break such ciphers. By adding 8 bits (one byte) for each byte using a function and another mathematical function to position the bits in a binary tree and using its in-order tour, this cipher can be made protected. Using an in-order tour of binary tree can diffuse the eight bits (includes 7 bits produced by the function and 1 random bit) and eight bits of the plaintext. This can highly protect the cipher. However, if the key management processes are not secured the strongest ciphers can easily be broken.

10 citations

Journal ArticleDOI
TL;DR: Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
Abstract: (1978). COMPUTER METHODS FOR DECRYPTING RANDOM STREAM CIPHERS. Cryptologia: Vol. 2, No. 3, pp. 215-231.

10 citations

01 Jan 2008
TL;DR: A genetic algorithm for finding the secret key of a block permutation cipher that is a permutation of some first natural numbers and finds the exact key's length and the key with controlled accuracy.
Abstract: In this article we discuss a possibility to use genetic algorithms in cryptanalysis. We developed and described the genetic algorithm for finding the secret key of a block permutation cipher. In this case key is a permutation of some first natural numbers. Our algorithm finds the exact key's length and the key with controlled accuracy. Evaluation of conducted experiment's results shows that the almost automatic cryptanalysis is possible.

9 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
93% related
Encryption
98.3K papers, 1.4M citations
90% related
Public-key cryptography
27.2K papers, 547.7K citations
89% related
Hash function
31.5K papers, 538.5K citations
88% related
Key (cryptography)
60.1K papers, 659.3K citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202337
202271
202133
202053
201942
201850