×

Analysis of Bitsum attack on block ciphers. (English) Zbl 1495.94041


MSC:

94A60 Cryptography

Software:

TEA; XTEA; Blowfish
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Schneier, B., ‘A self study course in block-cipher cryptanalysis’, Cryptologia, vol. 24, no.1, 18-34 (2004) · Zbl 1325.94002 · doi:10.1080/0161-110091888754
[2] Amandeep; Geetha, G., On the Security of Reduced Key Tiny Encryption Algorithm, 323-326 (2012), Punjab, India
[3] Heys, H. M., A tutorial on linear and differential cryptanalysis, ’, Cryptologia, vol. 26, 189-221 (2002) · Zbl 1325.94122 · doi:10.1080/0161-110291890885
[4] Schaefer, E., An introduction to Cryptography and Cryptanalysis (1999), Santa Clara University
[5] Zhang, W., Some results on cryptanalysis of SMS4 block cipher, International Journal of Applied Cryptography, vol. 2, 60-67 (2010) · Zbl 1195.94073 · doi:10.1504/IJACT.2010.033799
[6] Hakala, R. M.; Nyberg, K., A multidimensional linear distinguishing attack on the Shannon cipher, International Journal of Applied Cryptography, vol. 1, 161-168 (2009) · Zbl 1159.94362 · doi:10.1504/IJACT.2009.023463
[7] Geetha, G.; Bagga, A., Bit Sum Attack, The Security Journal, vol.35, 21-22 (2011)
[8] Bagga, A.; Geetha, G., Implications of Bitsum Attack on XOR, 47-50 (2012)
[9] Amandeep; Geetha, G., On the Security of Reduced Key Tiny Encryption Algorithm, 323-326 (2012)
[10] Amandeep; Geetha, G., Implications of Bitsum attack on tiny encryption algorithm and XTEA, Journal of Computer Science, vol. 10, 1077-1083 · doi:10.3844/jcssp.2014.1077.1083
[11] Wheeler, D.J., & Needham, R.J. (1994). ‘TEA, a tiny encryption algorithm’. In Fast Software Encryption - Proceedings of the 2nd International Workshop, 1008. · Zbl 0939.94550
[12] Needham, R. M.; Wheeler, D. J., TEA extensions (1997), University of Cambridge: University of Cambridge, Cambridge
[13] Shimizu; Miyaguchi, S., Fast Data Encipherment Algorithm FEAL (1987) · Zbl 1464.94051
[14] Schneier, B. (1994), ‘Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)’, Fast Software Encryption: Second International Workshop, in proceedings of Springer-Verlag, Leuven, Belgium, pp. 191-204. · Zbl 0943.94523
[15] Shannon, C. E., Communication theory of secrecy systems, Bell Syst. Tech. J., vol. 28, 656-715 (1949) · Zbl 1200.94005 · doi:10.1002/j.1538-7305.1949.tb00928.x
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.