Abstract
In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings |
Editors | JooSeok Song |
Publisher | Springer Verlag |
Pages | 38-52 |
Number of pages | 15 |
ISBN (Print) | 3540673806, 9783540673804 |
DOIs | |
Publication status | Published - 2000 |
Event | 2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of Duration: 1999 Dec 9 → 1999 Dec 10 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 1787 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 2nd International Conference on Information Security and Cryptology, ICISC 1999 |
---|---|
Country/Territory | Korea, Republic of |
City | Seoul |
Period | 99/12/9 → 99/12/10 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 2000.
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science