2020
DOI: 10.35940/ijrte.c4214.099320
|View full text |Cite
|
Sign up to set email alerts
|

Different Types of Attacks on Block Ciphers

Abstract: Cryptanalysis is a very important challenge that faces cryptographers. It has several types that should be well studied by cryptographers to be able to design cryptosystem more secure and able to resist any type of attacks. This paper introduces six types of attacks: Linear, Differential , Linear-Differential, Truncated differential Impossible differential attack and Algebraic attacks. In this paper, algebraic attack is used to formulate the substitution box(S-box) of a block cipher to system of nonlinear equa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(36 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Theorem 1 (see [10,11]). Given m equations in n terms in GF(2 4 ), the algebraic attack resistance (AAR) which is called Γ can be expressed as…”
Section: The S-box Algebraic Performancementioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 1 (see [10,11]). Given m equations in n terms in GF(2 4 ), the algebraic attack resistance (AAR) which is called Γ can be expressed as…”
Section: The S-box Algebraic Performancementioning
confidence: 99%
“…Te National Institute of Standards and Technology (NIST) published several criteria to measure the S-box strength, such as strict avalanche criterion, nonlinearity, and bit independence criterion [10,11]. Tis work provides a simple novel fast way to image encryption based on a highly nonlinear algebraic function expanded by a DNA conversion algorithm to expand the number of S-boxes.…”
Section: Introductionmentioning
confidence: 99%
“…iv. Camellia is vulnerable to square, integral, rectangle, and boomerang attacks [6], [7]. v. The Meet-in-the-Middle attack shows good progress on the Camellia [6].…”
mentioning
confidence: 99%
“…The existing literature, as provided in [6], [7], showed that intruders attack the Camellia algorithm. Linear Cryptanalysis (LC), Dierential Cryptanalysis (DC), boomerang, truncated dierentials, Meet-in-the-Middle, impossible dierential, and zero-correlation linear distinguisher are examples of cryptographic attacks [7], [9]. These attacks rely on distinguishers.…”
mentioning
confidence: 99%
See 1 more Smart Citation