Linear hulls with correlation zero and linear cryptanalysis of block ciphers

A Bogdanov, V Rijmen - Designs, codes and cryptography, 2014 - Springer
Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the
security of block ciphers. This work introduces a novel extension of linear cryptanalysis: zero …

Impossible differential cryptanalysis for block cipher structures

J Kim, S Hong, J Sung, S Lee, J Lim, S Sung - Progress in Cryptology …, 2003 - Springer
Abstract Impossible Differential Cryptanalysis (IDC)[4] uses impossible differential
characteristics to retrieve a subkey material for the first or the last several rounds of block …

A unified method for finding impossible differentials of block cipher structures

Y Luo, X Lai, Z Wu, G Gong - Information Sciences, 2014 - Elsevier
In this paper, we propose a systematic method for finding impossible differentials for block
cipher structures, which we call the unified impossible differential finding method or UID …

[HTML][HTML] Impossible differential cryptanalysis using matrix method

J Kim, S Hong, J Lim - Discrete Mathematics, 2010 - Elsevier
The general strategy of impossible differential cryptanalysis is to first find impossible
differentials and then exploit them for retrieving subkey material from the outer rounds of …

Generalized Feistel networks revisited

A Bogdanov, K Shibutani - Designs, codes and cryptography, 2013 - Springer
This work deals with the classification, security and efficiency of generalized Feistel
networks (GFNs) with 4 lines. We propose a definition of a GFN, essentially limiting …

Using the Muthavhine Function to Modify Skipjack Algorithm to Prevent LC and DC Attacks on IoT Devices

KD Muthavhine, M Sumbwanyambe - IEEE Access, 2024 - ieeexplore.ieee.org
The Skipjack algorithm is used by many Internet of Things (IoT) devices to secure and
encrypt data. Skipjack-encrypted data has been discovered to be vulnerable to Differential …

Information Security and Cryptography

U Maurer, M Abadi, R Anderson, M Bellare… - 2007 - Springer
Untitled Page 1 Page 2 Information Security and Cryptography Texts and Monographs
Series Editor Ueli Maurer Associate Editors Martin Abadi Ross Anderson Mihir Bellare …

Improvements for finding impossible differentials of block cipher structures

Y Luo, X Lai - Security and Communication Networks, 2017 - Wiley Online Library
We improve Wu and Wang's method for finding impossible differentials of block cipher
structures. This improvement is more general than Wu and Wang's method where it can find …

Impossible boomerang attack for block cipher structures

J Choy, H Yap - International Workshop on Security, 2009 - Springer
Abstract Impossible boomerang attack [5](IBA) is a new variant of differential cryptanalysis
against block ciphers. Evident from its name, it combines the ideas of both impossible …

Impossible Differential Cryptanalysis on Lai‐Massey Scheme

R Guo, C Jin - Etri Journal, 2014 - Wiley Online Library
The Lai‐Massey scheme, proposed by Vaudenay, is a modified structure in the International
Data Encryption Algorithm cipher. A family of block ciphers, named FOX, were built on the …