A New Approach towards Confusion Analysis of S-boxes using Truncated Differential Cryptanalysis

2019 ◽  
Vol 7 (1) ◽  
pp. 249-256
Author(s):  
Avijit Datta ◽  
Dipanjan Bhowmik ◽  
Sharad Sinha
2015 ◽  
Vol 8 (16) ◽  
pp. 2875-2887 ◽  
Author(s):  
Guangyao Zhao ◽  
Bing Sun ◽  
Chao Li ◽  
Jinshu Su

Author(s):  
Seonhee Lee ◽  
Seokhie Hong ◽  
Sangjin Lee ◽  
Jongin Lim ◽  
Seonhee Yoon

2015 ◽  
Vol 52 (2) ◽  
pp. 246-254 ◽  
Author(s):  
Nicolas T. Courtois ◽  
Theodosis Mourouzis ◽  
Anna Grocholewska-Czuryło ◽  
Jean-Jacques Quisquater

Differential Cryptanalysis (DC) is one of the oldest known attacks on block ciphers. DC is based on tracking of changes in the differences between two messages as they pass through the consecutive rounds of encryption. However DC remains very poorly understood. In his textbook written in the late 1990s Schneier wrote that against differential cryptanalysis, GOST is “probably stronger than DES”. In fact Knudsen have soon proposed more powerful advanced differential attacks however the potential space of such attacks is truly immense. To this day there is no method which allows to evaluate the security of a cipher against such attacks in a systematic way. Instead, attacks are designed and improved in ad-hoc ways with heuristics [6–13,21]. The best differential attack known has time complexity of 2179 [13]. In this paper we show that for a given block cipher there exists an optimal size for advanced differential properties. This new understanding allows to considerably reduce the space to be searched for “good” truncated differential properties suitable for an attack.


Sign in / Sign up

Export Citation Format

Share Document