2022
DOI: 10.47577/technium.v4i10.7700
|View full text |Cite
|
Sign up to set email alerts
|

Differential Distribution Table implementation DDT survey

Abstract: The security of the transmitted data is one of the important issues that led to improve cryptosystems. Block ciphers as symmetric key cryptosystems are widely implemented in different applications and devices. Many algorithms had been presented that proposed new designs and enhancements for the block ciphers. Most of these papers based on the differential characteristics that provided by the Differential Distribution table DDT. The implementation of DDT had several points of advantages in design, modify and at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 26 publications
1
3
0
Order By: Relevance
“…According to these ndings, any DDTbased attack could exploit the probabilities found in DDT to attack DES, AES, and Camellia. The study conrmed the theoretical results found in [31], [78], and [76], since the experimental results were the same as the theoretical results. Refer to Table Table 9 and Figure 20.…”
Section: Resultssupporting
confidence: 84%
“…According to these ndings, any DDTbased attack could exploit the probabilities found in DDT to attack DES, AES, and Camellia. The study conrmed the theoretical results found in [31], [78], and [76], since the experimental results were the same as the theoretical results. Refer to Table Table 9 and Figure 20.…”
Section: Resultssupporting
confidence: 84%
“…It is noted in the encryption and decryption process that the required time increases with the increase in the size of the encrypted text file. The increase is almost linear according to Table (4), which indicates the efficiency of speed of the proposed cipher with smaller sizes.…”
Section: A-randomness Of the Keymentioning
confidence: 73%
“…The times spent in the encryption process were recorded according to the sizes of the encrypted files. Table (4) show the results. It is noted in the encryption and decryption process that the required time increases with the increase in the size of the encrypted text file.…”
Section: A-randomness Of the Keymentioning
confidence: 99%
See 1 more Smart Citation