Presentation | 1998/7/30 S-box design considering the security against known attacks on block ciphers Shiho Moriai, Kazumaro Aoki, Masayuki Kanda, Youichi Takashima, Kazuo Ohta, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The short-cut attacks on block ciphers usually exploit the invulnerability of the S-boxes to analyze the algorithm. Thus, when designing a block cipher with no vulnerability to these attacks, how to construct S-boxes is an important issue. This paper presents S-box design criteria for differential attack, linear attack, higher order differential attack, interpolation attack, and partitioning attack. We show how the s-box in the block cipher E2 was designed considering security against the attacks above. We also evaluate the security of E2 against higher order differential attack, interpolation attack, and partitioning attack. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | block cipher / S-box / differential cryptanalysis / liniar cryptanalysis / higher order differential attack / interpolation attack / partitioning cryptanalysis / E2 |
Paper # | ISEC98-13 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/7/30(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | S-box design considering the security against known attacks on block ciphers |
Sub Title (in English) | |
Keyword(1) | block cipher |
Keyword(2) | S-box |
Keyword(3) | differential cryptanalysis |
Keyword(4) | liniar cryptanalysis |
Keyword(5) | higher order differential attack |
Keyword(6) | interpolation attack |
Keyword(7) | partitioning cryptanalysis |
Keyword(8) | E2 |
1st Author's Name | Shiho Moriai |
1st Author's Affiliation | NTT Information and Communication Systems Laboratories() |
2nd Author's Name | Kazumaro Aoki |
2nd Author's Affiliation | NTT Information and Communication Systems Laboratories |
3rd Author's Name | Masayuki Kanda |
3rd Author's Affiliation | NTT Information and Communication Systems Laboratories |
4th Author's Name | Youichi Takashima |
4th Author's Affiliation | NTT Human Interface Systems Laboratories |
5th Author's Name | Kazuo Ohta |
5th Author's Affiliation | NTT Information and Communication Systems Laboratories |
Date | 1998/7/30 |
Paper # | ISEC98-13 |
Volume (vol) | vol.98 |
Number (no) | 227 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |