On the optimal diffusion layers with practical security against differential and linear cryptanalysis

Ju Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.

    Original languageEnglish
    Title of host publicationInformation Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings
    EditorsJooSeok Song
    PublisherSpringer Verlag
    Pages38-52
    Number of pages15
    ISBN (Print)3540673806, 9783540673804
    DOIs
    Publication statusPublished - 2000
    Event2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of
    Duration: 1999 Dec 91999 Dec 10

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume1787
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other2nd International Conference on Information Security and Cryptology, ICISC 1999
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period99/12/999/12/10

    Bibliographical note

    Publisher Copyright:
    © Springer-Verlag Berlin Heidelberg 2000.

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'On the optimal diffusion layers with practical security against differential and linear cryptanalysis'. Together they form a unique fingerprint.

    Cite this