This thesis documents nonlinearity analyses performed on the key generation protocol of El-Gamal AAß Cryptosystem. The main aim of this research is to improve the security of the cryptosystem with regards to its key generation protocol against linear cryptanalysis, and this is achieved through series of tests and evaluations of the strength of the protocol in terms of nonlinearity measurement and bijectivity evaluation. Basically, the work is done in two phases. In the first phase, the bijectivity of AAß function in the cryptosystem is evaluated. The process consisted of investigating the function in the protocol and inspecting bit distribution in the public key to determine whether it is balanced or not. In the second phase, a statis...
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block c...
Linear cryptanalysis introduced by Matsui is a statistical attack which exploits a binary linear rel...
The article defines standard criteria used to characterize the cryptographic quality of the S box: r...
: The connections among the various nonlinearity criteria is currently an important topic in the are...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of ...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
We present a deterministic algorithm to find nonlinear S-box approximations, and a new nonlinear cry...
The main goal of this diploma work is the implementation of Matsui's linear cryptanalysis of DES and...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
In this research, we strengthen the security of the El-Gamal Cryptosystem, simply referred as the AA...
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block c...
Linear cryptanalysis introduced by Matsui is a statistical attack which exploits a binary linear rel...
The article defines standard criteria used to characterize the cryptographic quality of the S box: r...
: The connections among the various nonlinearity criteria is currently an important topic in the are...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of ...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
Strong cryptography of stream ciphers is determined, among other things, by the ability of a generat...
The connections among the various nonlinearity criteria is currently an important topic in the area ...
We present a deterministic algorithm to find nonlinear S-box approximations, and a new nonlinear cry...
The main goal of this diploma work is the implementation of Matsui's linear cryptanalysis of DES and...
Several generalizations of linear cryptanalysis have been proposed in the past, as well as very simi...
Our paper describes a particular class of digital cipher system that generates encryption keys using...
In this research, we strengthen the security of the El-Gamal Cryptosystem, simply referred as the AA...
Relatório de projeto de pesquisa.In this paper, we study linear relations propagating across block c...
Linear cryptanalysis introduced by Matsui is a statistical attack which exploits a binary linear rel...
The article defines standard criteria used to characterize the cryptographic quality of the S box: r...