2011
DOI: 10.1007/s11432-011-4430-5
|View full text |Cite
|
Sign up to set email alerts
|

Capability of evolutionary cryptosystems against differential cryptanalysis

Abstract: The evolutionary cryptosystem is a new cryptosystem. This paper studies its security level resisting against differential cryptanalysis. It is shown that the evolutionary cryptosystem possesses higher resistance than its initial fixed cryptosystem against differential cryptanalysis. On the basis of the relationship among the data complexity, the bit advantage and the success rate of differential cryptanalysis, it is proven that more data is needed for attacking the evolutionary cryptosystem when the bit advant… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Cryptogram coding is the translation process from plaintext information codes to ciphertext information code according to appointment rules. Evolving cryptography is a combination of cryptology and evolutionary computation, which improves the adaptability of cryptography by borrowing biological evolution theory [7]. Besides, variable algorithm cryptography cluster is to resist cryptanalytic attacks effectively by improving the diversity and efficiency of cryptographic services.…”
Section: Inspiration Of Movingmentioning
confidence: 99%
“…Cryptogram coding is the translation process from plaintext information codes to ciphertext information code according to appointment rules. Evolving cryptography is a combination of cryptology and evolutionary computation, which improves the adaptability of cryptography by borrowing biological evolution theory [7]. Besides, variable algorithm cryptography cluster is to resist cryptanalytic attacks effectively by improving the diversity and efficiency of cryptographic services.…”
Section: Inspiration Of Movingmentioning
confidence: 99%
“…Cryptography is one of the most significant techniques in the field of information security [25,26,26,28,29,30]. The use of evolutionary computation to analyze the cryptology is the product of evolutionary computation and cryptography combined with each other, 30 years, and many scholars at home and abroad this series of research and study, and made a lot of achievements.…”
Section: Cryptology Evolution Analysis Of the Development Trend Of Thmentioning
confidence: 99%
“…Thus, as early as in 2004, Clark on the analysis of the status and progress of the cryptology evolution do an analysis and discussion of the system, and pointed out that the analysis of the evolution of modern cryptography will be a very difficult, long-term task [17,22,23,24].…”
Section: Cryptology Evolution Analysis Of the Development Trend Of Thmentioning
confidence: 99%
“…In the field of Cryptography, researchers in China have made a lot of progresses in recent years [2][3][4][5], which certainly provides a strong support for the development of trusted computing. In December 2007, State Cryptography Administration Bureau of China published the functionality and interface specification of cryptographic support platform for trusted computing [6], which marks a new stage of the development of trusted computing in China.…”
Section: Trusted Computing Infrastructurementioning
confidence: 99%