Logo BSU

Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот документ: https://elib.bsu.by/handle/123456789/120040
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorRostovtsev, A. G.-
dc.contributor.authorSuprun, A. F.-
dc.date.accessioned2015-10-06T10:58:05Z-
dc.date.available2015-10-06T10:58:05Z-
dc.date.issued2014-
dc.identifier.citationNonlinear Phenomena in Complex Systems. - 2014. - Vol. 17, N 3. - P. 215-230ru
dc.identifier.issn1561 - 4085-
dc.identifier.urihttp://elib.bsu.by/handle/123456789/120040-
dc.description.abstractThe ciphers y = C (x, k) and y = C(x, k) are isomorphic if there is a computable in both directions map y ↔ y, x ↔ x, k ↔ k. The cipher is vulnerable to an attack if the isomorphic cipher is vulnerable to it. If φ is a substitution and T is an encryption operator, then T = φT φ 1 is a cipher isomorphism. For cryptanalysis it is reasonable to choose substitution φ in such a way that it has a lot of fixed points. It is shown that byte substitution φ can have no more than 130 fixed points. Isomorphic AES (IAES) is proposed where the only non-linear operation is an isomorphic image of the XOR operation. On average, maximum probabilities of IAES differentials are 8.5 times higher in comparison with the original whereas dominance of the linear sum is increased by 3 times. IAES has differentials with zero output difference and probability 1, which slows down replication of active non-linearities and decreases complexity of an attack. Presumably, resistance of AES to linear and differential attacks can be twice reduced by magnitude in comparison with the generally accepted estimates.ru
dc.language.isoenru
dc.publisherMinsk : Education and Upbringingru
dc.rightsinfo:eu-repo/semantics/restrictedAccessen
dc.subjectЭБ БГУ::ТЕХНИЧЕСКИЕ И ПРИКЛАДНЫЕ НАУКИ. ОТРАСЛИ ЭКОНОМИКИ::Автоматика. Вычислительная техникаru
dc.titleStrengthening differential and linear attacks using virtual isomorphismsru
dc.typearticleen
Располагается в коллекциях:2014. Volume 17. Number 3

Полный текст документа:
Файл Описание РазмерФормат 
v17no3p215.pdf161,19 kBAdobe PDFОткрыть
Показать базовое описание документа Статистика Google Scholar



Все документы в Электронной библиотеке защищены авторским правом, все права сохранены.