Logo BSU

Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот документ: http://elib.bsu.by/handle/123456789/120040
Заглавие документа: Strengthening differential and linear attacks using virtual isomorphisms
Авторы: Rostovtsev, A. G.
Suprun, A. F.
Тема: ЭБ БГУ::ТЕХНИЧЕСКИЕ И ПРИКЛАДНЫЕ НАУКИ. ОТРАСЛИ ЭКОНОМИКИ::Автоматика. Вычислительная техника
Дата публикации: 2014
Издатель: Minsk : Education and Upbringing
Библиографическое описание источника: Nonlinear Phenomena in Complex Systems. - 2014. - Vol. 17, N 3. - P. 215-230
Аннотация: The ciphers y = C (x, k) and y = C(x, k) are isomorphic if there is a computable in both directions map y ↔ y, x ↔ x, k ↔ k. The cipher is vulnerable to an attack if the isomorphic cipher is vulnerable to it. If φ is a substitution and T is an encryption operator, then T = φT φ 1 is a cipher isomorphism. For cryptanalysis it is reasonable to choose substitution φ in such a way that it has a lot of fixed points. It is shown that byte substitution φ can have no more than 130 fixed points. Isomorphic AES (IAES) is proposed where the only non-linear operation is an isomorphic image of the XOR operation. On average, maximum probabilities of IAES differentials are 8.5 times higher in comparison with the original whereas dominance of the linear sum is increased by 3 times. IAES has differentials with zero output difference and probability 1, which slows down replication of active non-linearities and decreases complexity of an attack. Presumably, resistance of AES to linear and differential attacks can be twice reduced by magnitude in comparison with the generally accepted estimates.
URI документа: http://elib.bsu.by/handle/123456789/120040
ISSN: 1561 - 4085
Располагается в коллекциях:2014. Volume 17. Number 3

Полный текст документа:
Файл Описание РазмерФормат 
v17no3p215.pdf161,19 kBAdobe PDFОткрыть


Все документы в Электронной библиотеке защищены авторским правом, все права сохранены.