Difference distribution attack on DONUT and improved DONUT

Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seon Hee Yoon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Vaudenay[12] proposed a new way of protecting block ciphers against classes of attacks, which was based on the notion of decorrelation. He also suggested two block cipher families COCONUT and PEANUT. Wagner[14] suggested a new Differential-style attack called boomerang attack and cryptanalyzed COCONUT’98. Cheon[5] suggested a new block cipher DONUT which was made by two pairwise perfect decorrelation modules and is secure against boomerang attack. In this paper we suggest an attack called Difference distribution attack on DONUT. We also suggest an improved DONUT which is secure against Difference distribution attack.

    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    PublisherSpringer Verlag
    Pages37-48
    Number of pages12
    Volume2015
    ISBN (Print)3540417826, 9783540452478
    DOIs
    Publication statusPublished - 2001
    Event3rd International Conference on Information Security and Cryptology, ICISC 2000 - Seoul, Korea, Republic of
    Duration: 2000 Dec 82000 Dec 9

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume2015
    ISSN (Print)03029743
    ISSN (Electronic)16113349

    Other

    Other3rd International Conference on Information Security and Cryptology, ICISC 2000
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period00/12/800/12/9

    Keywords

    • Decorrelation
    • Difference distribution attack(DDA)
    • Differential cryptanalysis(DC)
    • DONUT
    • Linear cryptanalysis(LC)

    ASJC Scopus subject areas

    • Computer Science(all)
    • Theoretical Computer Science

    Fingerprint

    Dive into the research topics of 'Difference distribution attack on DONUT and improved DONUT'. Together they form a unique fingerprint.

    Cite this