Integral cryptanalysis of SPN ciphers with binary permutations

Letter
  • 45 Downloads

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61572521), Foundation of Science and Technology on Information Assurance Laboratory (Grant No. KJ-15-010), Scientific Research Project of Education Department of Hunan Province (Grant No. 17B214), Natural Science Foundation of Shaanxi Province (Grant No. 2016JQ6030).

Supplementary material

11432_2016_9184_MOESM1_ESM.pdf (78 kb)
Supplementary material, approximately 78 KB.

References

  1. 1.
    Knudsen L R, Wagner D. Integral cryptanalysis. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2002. 112–127CrossRefGoogle Scholar
  2. 2.
    Z’aba M R, Raddum H, Henricksen H, et al. Bitpattern based integral attack. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2008. 363–381CrossRefGoogle Scholar
  3. 3.
    Sun B, Qu L J, Li C. New cryptanalysis of block ciphers with low algebraic degree. In: Proceedings of International Workshop on Fast Software Encryption. Berlin/Heidelberg: Springer, 2009. 180–192CrossRefGoogle Scholar
  4. 4.
    Sun B, Liu M C, Guo J, et al. Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin/Heidelberg: Springer, 2016. 196–213Google Scholar
  5. 5.
    Kwon D, Kim J, Park S, et al. New block cipher: ARIA. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2004. 432–445Google Scholar
  6. 6.
    Li P, Sun B, Li C. Integral cryptanalysis of ARIA. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2010. 1–14Google Scholar
  7. 7.
    Li Y J,WuWL, Zhang L. Integral attacks on reducedround ARIA block cipher. In: Proceedings of International Conference on Information Security, Practice and Experience. Berlin/Heidelberg: Springer, 2010. 19–29Google Scholar
  8. 8.
    Koo B, Jang H, Song J. On constructing of a 32 × 32 binary matrix as a diffusion layer for a 256-bit block cipher. In: Proceedings of International Conference on Information Security and Cryptology. Berlin/Heidelberg: Springer, 2006. 51–64Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017

Authors and Affiliations

  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina
  2. 2.School of Information Science and EngineeringJishou UniversityJishouChina
  3. 3.Electronics Technology DepartmentEngineering University of Armed Police ForceXi’anChina

Personalised recommendations