11-Round impossible differential algebraic attack for serpent encryption algorithm

2010 ◽  
Vol 15 (3) ◽  
pp. 232-236
Author(s):  
Zhihua Hu ◽  
Zhongping Qin

Cryptanalysis is a very important challenge that faces cryptographers. It has several types that should be well studied by cryptographers to be able to design cryptosystem more secure and able to resist any type of attacks. This paper introduces six types of attacks: Linear, Differential , Linear-Differential, Truncated differential Impossible differential attack and Algebraic attacks. In this paper, algebraic attack is used to formulate the substitution box(S-box) of a block cipher to system of nonlinear equations and solve this system by using a classical method called Grobner  Bases . By Solving these equations, we made algebraic attack on S-box.


Author(s):  
R.G. Biyashev ◽  
◽  
M.N. Kalimoldayev ◽  
S.E. Nyssanbayeva ◽  
N.A. Kapalova ◽  
...  
Keyword(s):  

Author(s):  
Xiaoyan ZHANG ◽  
Qichun WANG ◽  
Bin WANG ◽  
Haibin KAN

2018 ◽  
Vol 77 (9) ◽  
pp. 799-816
Author(s):  
I. D. Gorbenko ◽  
O. G. Kachko ◽  
M. V. Yesina
Keyword(s):  

2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


2019 ◽  
Vol 38 (3) ◽  
pp. 647-678 ◽  
Author(s):  
Ľuboš Ovseník ◽  
Ján Turán ◽  
Tomáš Huszaník ◽  
Jakub Oravec ◽  
Ondrej Kováč ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document