Open Access

On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes


Cite

1. Angelova, V., Y. Borissov. Plaintext Recovery in DES-Like Cryptosystems Based on S-Boxes with Embedded Parity Check. - Serdica Journal of Computing, Vol. 7, 2013, No 3, pp. 257-270.10.55630/sjc.2013.7.257-270Search in Google Scholar

2. Biham, E., A. Shamir. Differential Cryptanalysis of DES-Like Cryptosystems. - Journal of Cryptology, Vol. 4, 1991, No 1, Springer, pp. 3-72.10.1007/BF00630563Search in Google Scholar

3. Borissov, Y., P. Boyvalenkov, R. Tsenko v. Linear Cryptanalysis and Modified DESwith Parity Check in the S-Boxes. - In: 2nd Conference on Cryptography and Information Security in the Balkans, LNCS, Vol. 9540, Springer, 2016, pp. 60-78.Search in Google Scholar

4. Coppersmith, D. The Data Encryption Standard (DES) and Its Strength Against Attacks. - IBM Journal of Research and Development, Vol. 38, 1994, No 3, pp. 243-250.10.1147/rd.383.0243Search in Google Scholar

5. Cusick, T. W., P. Stanic a. Cryptographic Boolean Functions and Applications. San Diego, Academic Press, Elsevier Inc., 2009.10.1016/B978-0-12-374890-4.00009-4Search in Google Scholar

6. Hellman, M., R. Merkle, R. Schroeppel, L. Wash ington, W. Diffie, S. Pohlig, P. Schweitzer. Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. - SEL 76-042, 9 September 1976.Search in Google Scholar

7. Konheim, A. G. Computer Security and Cryptography. New Jersey, John Wiley & Sons, Inc., 2007.10.1002/0470083980Search in Google Scholar

8. Matsui, M. Linear Cryptanalysis Method of DES Cipher. - Advances in Cryptology-EUROCRYPT’93, LNCS, Vol. 765, Springer, 1994, pp. 386-397.10.1007/3-540-48285-7_33Search in Google Scholar

9. Matsui, M. Linear Cryptanalysis of DES Cipher (I), Version 1.03. http://www.cs.bilkent.edu.tr/~selcuk/teaching/cs519/Matsui-LC.pdfSearch in Google Scholar

10. Matsui, M. The First Experimental Cryptanalysis of the Data Encryption Standard. - In: Advances in Cryptology-CRYPTO’94, LNCS, Vol. 839, Springer, 1994, pp. 1-11.10.1007/3-540-48658-5_1Search in Google Scholar

11. Nyberg, K. On the Construction of Highly Nonlinear Permutation. - In: Advances in Cryptology-EUROCRYPT’92, LNCS, Vol. 658, Springer, 1993, pp. 92-98.10.1007/3-540-47555-9_8Search in Google Scholar

12. Pieprzyk, J., C. Charnes, J. Seberr y. On the Immunity of S-Boxes Against Linear Cryptanalysis. citeseerx.ist.psu.eduSearch in Google Scholar

13. Schneier, B. Applied Cryptography. Second Edition. New Jersey, John Wiley & Sons, Inc., 1996. Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology