Abstract — In this paper, we investigate the application of inte-gral cryptanalysis to the Byte-oriented Substitution Permutation Network (BSPN) block cipher. The BSPN block cipher has been shown to be an efficient block cipher structure, particularly for environments using 8-bit microcontrollers. In our analysis, we are able to show that integral cryptanalysis has limited success when applied to BSPN. A first order attack, based on a deterministic integral, is only applicable to structures with 3 or fewer rounds, while higher order attacks and attacks using a probabilistic integral were found to be only applicable to structures with 4 or less rounds. Since a typical BSPN block cipher is recommended to have 8 or more rounds, it is expected ...
The current paper presents an integral cryptanalysis in the single-key setting against light-weight ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
Abstract. This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its...
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, ...
Abstract. In this paper, we show structural cryptanalyses against two popular networks, i.e., the Fe...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Abstract. Deliberate injection of faults into cryptographic devices is an effec-tive cryptanalysis t...
© 2014 John Wiley & Sons, Ltd. Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryp...
The current paper presents an integral cryptanalysis in the single-key setting against light-weight ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The workload of computers has changed dramatically. New user requirements include the increasing nee...
In this paper, we propose a practical algorithm that can be used to analyze the block cipher structu...
In this paper, a new method for evaluating the integral property, truncated and impossible different...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
A block cipher, in general, consist of several repetitions of a round transformation. A round transf...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Abstract — In this paper, we examine a class of block ciphers referred to as substitutionpermutation...
Abstract. This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its...
Integral attacks are well-known to be effective against byte-based block ciphers. In this document, ...
Abstract. In this paper, we show structural cryptanalyses against two popular networks, i.e., the Fe...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Abstract. Deliberate injection of faults into cryptographic devices is an effec-tive cryptanalysis t...
© 2014 John Wiley & Sons, Ltd. Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryp...
The current paper presents an integral cryptanalysis in the single-key setting against light-weight ...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
The workload of computers has changed dramatically. New user requirements include the increasing nee...