Have a personal or library account? Click to login
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes Cover

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes

Open Access
|Dec 2016

References

  1. 1. Angelova, V., Y. Borissov. Plaintext Recovery in DES-Like Cryptosystems Based on S-Boxes with Embedded Parity Check. - Serdica Journal of Computing, Vol. 7, 2013, No 3, pp. 257-270.10.55630/sjc.2013.7.257-270
  2. 2. Biham, E., A. Shamir. Differential Cryptanalysis of DES-Like Cryptosystems. - Journal of Cryptology, Vol. 4, 1991, No 1, Springer, pp. 3-72.10.1007/BF00630563
  3. 3. Borissov, Y., P. Boyvalenkov, R. Tsenko v. Linear Cryptanalysis and Modified DESwith Parity Check in the S-Boxes. - In: 2nd Conference on Cryptography and Information Security in the Balkans, LNCS, Vol. 9540, Springer, 2016, pp. 60-78.
  4. 4. Coppersmith, D. The Data Encryption Standard (DES) and Its Strength Against Attacks. - IBM Journal of Research and Development, Vol. 38, 1994, No 3, pp. 243-250.10.1147/rd.383.0243
  5. 5. Cusick, T. W., P. Stanic a. Cryptographic Boolean Functions and Applications. San Diego, Academic Press, Elsevier Inc., 2009.10.1016/B978-0-12-374890-4.00009-4
  6. 6. Hellman, M., R. Merkle, R. Schroeppel, L. Wash ington, W. Diffie, S. Pohlig, P. Schweitzer. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. - SEL 76-042, 9 September 1976.
  7. 7. Konheim, A. G. Computer Security and Cryptography. New Jersey, John Wiley & Sons, Inc., 2007.10.1002/0470083980
  8. 8. Matsui, M. Linear Cryptanalysis Method of DES Cipher. - Advances in Cryptology-EUROCRYPT’93, LNCS, Vol. 765, Springer, 1994, pp. 386-397.10.1007/3-540-48285-7_33
  9. 9. Matsui, M. Linear Cryptanalysis of DES Cipher (I), Version 1.03. http://www.cs.bilkent.edu.tr/~selcuk/teaching/cs519/Matsui-LC.pdf
  10. 10. Matsui, M. The First Experimental Cryptanalysis of the Data Encryption Standard. - In: Advances in Cryptology-CRYPTO’94, LNCS, Vol. 839, Springer, 1994, pp. 1-11.10.1007/3-540-48658-5_1
  11. 11. Nyberg, K. On the Construction of Highly Nonlinear Permutation. - In: Advances in Cryptology-EUROCRYPT’92, LNCS, Vol. 658, Springer, 1993, pp. 92-98.10.1007/3-540-47555-9_8
  12. 12. Pieprzyk, J., C. Charnes, J. Seberr y. On the Immunity of S-Boxes Against Linear Cryptanalysis. citeseerx.ist.psu.edu
  13. 13. Schneier, B. Applied Cryptography. Second Edition. New Jersey, John Wiley & Sons, Inc., 1996.
DOI: https://doi.org/10.1515/cait-2016-0063 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 3 - 12
Published on: Dec 22, 2016
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2016 Yuri Borissov, Peter Boyvalenkov, Robert Tsenkov, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.