Open Access

Towards Provable Security of Rijndael-Like Spn Ciphers Against Differential Attacks

[1] DAEMEN, J.-RIJMEN, V.: AES proposal Rijndael, AES Round 1 Technical Evaluation CD1: Documentation, National Institute of Standards and Technology, 1998, http://www.nist.gov/aes.Search in Google Scholar

[2] SUGITA, M.-KOBARA, K.-UEHARA, K.-KUBOTA, S.-IMAI, H.: Relationshipsamong differential, truncated differential, impossible differential cryptanalyses againstword-oriented block cipher like Rijndael, E2, in: Proc. of the 3rd AES Candidate Conference, New York, USA, 2000, National Institute of Standards and Technology, 2000, pp. 242-254, http://www.nist.gov/aes.Search in Google Scholar

[3] SUGITA, M.-KOBARA, K.-IMAI, H.: Pseudorandomness and maximum average ofdifferential probability of block ciphers with SPN-structures like E2, in: Proc. of the 2nd AES Candidate Conference, AES Workshop, Rome, Italy, 1999, pp. 200-214.Search in Google Scholar

[4] KNUDSEN, L. R.: Truncated and higher order differentials, in: Fast Software Encryption-FSE ’95, 2nd Internat. Workshop (B. Preneel, ed.), Leuven, 1995, Lecture Notes in Comput. Sci., Vol. 1008, Springer-Verlag, Berlin, 1995, pp. 196-211.Search in Google Scholar

[5] KNUDSEN, L. R.-BERSON, T. A.: Truncated differentials of SAFER, in: Fast Software Encryption-FSE ’96, 3rd Internat. Workshop (D. Gollmann, ed.), Cambridge, UK, Lecture Notes in Comput. Sci., Vol. 1039, Springer-Verlag, Berlin, 1996, pp. 15-25.Search in Google Scholar

[6] MATSUI, M.-TOKITA, T.: Cryptanalysis of reduced version of the block cipher E2, Fast Software Encryption-FSE ’99, 6th Internat. Workshop (L. Knudsen, ed.), Lecture Notes in Comput. Sci., Vol. 1636, Springer-Verlag, Berlin, 1999, pp. 71-80.Search in Google Scholar

[7] RUZHENTSEV, V. I.: About methods of an estimation of resistance to truncated differentialsattack, Radioelektronika i informatika 4 (2003), 130-133. (In Russian)Search in Google Scholar

[8] MORIAI, S.-SUGITA, M.-AOKI, K.: Security of E2 against truncated differentialcryptanalysis, in: Selected Areas in Cryptography-SAC ’99, 6th Annual Internat. Workshop (H. Heys, C. Adams, eds.), Lecture Notes in Comput. Sci., Vol. 1758, Springer-Verlag, Berlin, 2000, pp. 106-117.Search in Google Scholar

[9] DOLGOV, V. I.-RUZHENTSEV, V. I.: About the method of evaluation the resistance ofcipher Rijndael to differential attacks, Radioelektronika i informatika 1 (2002), 136-138. (In Russian)Search in Google Scholar

ISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics