Explore chapters and articles related to this topic
Lightweight Cryptography in 5G Machine-Type Communication
Published in Mahmoud Elkhodr, Qusay F. Hassan, Seyed Shahrestani, Networks of the Future, 2017
Hüsnü Yıldız, Adnan Kılıç, Ertan Onur
However, impossible differential cryptanalysis shows that having an upper bound, p, for the probability distribution of differentials is not enough since the existence of an impossible differential might allow an attacker to break into the system.
A smart review and two new techniques using 4-bit Boolean functions for cryptanalysis of 4-bit crypto S-boxes
Published in International Journal of Computers and Applications, 2021
The design of a Feistel cipher with at least five rounds that has been resistant to differential cryptanalysis has been reported to the crypto-community [37]. The exploration of the possibility of defeating differential cryptanalysis by designing crypto S-boxes with equi-probable output xors using bent functions has been reported once [38]. The description of some design criteria for creating good crypto S-boxes that are immune to differential cryptanalysis and these criteria are based on information theoretic concepts has been reported later [39]. The differential cryptanalysis (DC) on a reduced round variant of DES [40] was introduced and broke a variety of ciphers. The fastest break was of two-pass Snefru [41]. Description of the cryptanalysis of the full 16-round DES using an improved version of DC had also been introduced [40,42]. It has been shown that there have been DES-like iterated ciphers that do not yield to differential cryptanalysis [43] and also the concept of Markov ciphers was introduced and its significance in differential cryptanalysis explained. It has also been investigated that the security of iterated block ciphers shows how to and when an r-round cipher is not vulnerable to attacks [44]. It has also been proposed that the eight-round twofish can be attacked and the role of key dependent S-boxes in differential cryptanalysis was investigated [45]. It has been on the same line with [38] but proposed that the input variables be increased and that the S-box be balanced to increase resistance toward both differential and linear cryptanalysis [46]. Early in this century, in the previous decade, estimation of probability of block ciphers against linear and differential cryptanalytic attack had been reported. Later, a new algebraic and statistical technique of cryptanalysis against block cipher PRESENT-128 had been reported [47]. Almost three years later, a new technique entitled impossible differential cryptanalysis has also been reported [48]. A detailed comparative study of DES based on the strength of DES against linear and differential cryptanalysis has been reported later [49]. At last, constraints of programming models of chosen key differential cryptanalysis have been reported to the crypto-community [50].