Abstract. The first contribution of this paper is a new approach to χ2 analyses of block ciphers in which plaintexts are chosen in a manner similar to that in a square/saturation attack. The consequence is a faster detection of χ2 correlation when compared to conventional χ2 cryptanalysis. The second contribution of the paper is the application of a technique similar to the aforementioned approach, but aided by linear cryptanalysis, on the RC6-family of block ciphers. Using this technique we (i) improve the previously best-known χ2 attacks on reduced-round RC6, and (ii) mount the first attacks on other RC6-like block ciphers- MRC6 and ERC6. The analyses of these fast primitives were also motivated by their low diffusion powers and, in the c...
The results of the differential and linear properties analysis of the ciphers Rijndael, Serpent, Thr...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
We investigate the cryptanalysis of the reduced-round RC6 without whitening. Up to the present, prev...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
In this paper, we make progress on χ^2-attack by introducing the optimization. We propose three key...
We investigate the cryptanalysis of reduced-round RC6 without whitening. Up to now, key recovery alg...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack can be used for both distinguishing ...
Abstract. At the beginning of the paper we describe the state of art in linear cryptanalysis of bloc...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
The χ^2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effectiv...
. The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper w...
Data security is very important in the field of Computer Science. In this paper, the encryption algo...
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a ca...
The results of the differential and linear properties analysis of the ciphers Rijndael, Serpent, Thr...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We de...
We investigate the cryptanalysis of the reduced-round RC6 without whitening. Up to the present, prev...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
In this paper, we make progress on χ^2-attack by introducing the optimization. We propose three key...
We investigate the cryptanalysis of reduced-round RC6 without whitening. Up to now, key recovery alg...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack can be used for both distinguishing ...
Abstract. At the beginning of the paper we describe the state of art in linear cryptanalysis of bloc...
Knudsen and Meier applied the χ^2-attack to RC6. The χ^2-attack recovers a key by using high correla...
The χ^2-attack was originally proposed by Knudsen and Meier. This attack is one of the most effectiv...
. The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper w...
Data security is very important in the field of Computer Science. In this paper, the encryption algo...
CAST-256 (or CAST6) is a symmetric-key block cipher published in June 1998. It was submitted as a ca...
The results of the differential and linear properties analysis of the ciphers Rijndael, Serpent, Thr...
Summary form only given. When designing symmetric ciphers, security and performance are of utmost im...
Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been re...