Please use this identifier to cite or link to this item:
https://elib.bsu.by/handle/123456789/120040Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Rostovtsev, A. G. | - |
| dc.contributor.author | Suprun, A. F. | - |
| dc.date.accessioned | 2015-10-06T10:58:05Z | - |
| dc.date.available | 2015-10-06T10:58:05Z | - |
| dc.date.issued | 2014 | - |
| dc.identifier.citation | Nonlinear Phenomena in Complex Systems. - 2014. - Vol. 17, N 3. - P. 215-230 | ru |
| dc.identifier.issn | 1561 - 4085 | - |
| dc.identifier.uri | http://elib.bsu.by/handle/123456789/120040 | - |
| dc.description.abstract | The ciphers y = C (x, k) and y = C(x, k) are isomorphic if there is a computable in both directions map y ↔ y, x ↔ x, k ↔ k. The cipher is vulnerable to an attack if the isomorphic cipher is vulnerable to it. If φ is a substitution and T is an encryption operator, then T = φT φ 1 is a cipher isomorphism. For cryptanalysis it is reasonable to choose substitution φ in such a way that it has a lot of fixed points. It is shown that byte substitution φ can have no more than 130 fixed points. Isomorphic AES (IAES) is proposed where the only non-linear operation is an isomorphic image of the XOR operation. On average, maximum probabilities of IAES differentials are 8.5 times higher in comparison with the original whereas dominance of the linear sum is increased by 3 times. IAES has differentials with zero output difference and probability 1, which slows down replication of active non-linearities and decreases complexity of an attack. Presumably, resistance of AES to linear and differential attacks can be twice reduced by magnitude in comparison with the generally accepted estimates. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Minsk : Education and Upbringing | ru |
| dc.rights | info:eu-repo/semantics/restrictedAccess | en |
| dc.subject | ЭБ БГУ::ТЕХНИЧЕСКИЕ И ПРИКЛАДНЫЕ НАУКИ. ОТРАСЛИ ЭКОНОМИКИ::Автоматика. Вычислительная техника | ru |
| dc.title | Strengthening differential and linear attacks using virtual isomorphisms | ru |
| dc.type | article | en |
| Appears in Collections: | 2014. Volume 17. Number 3 | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| v17no3p215.pdf | 161,19 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

