On the optimal diffusion layers with practical security against differential and linear cryptanalysis

Ju Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages38-52
Number of pages15
Volume1787
ISBN (Print)3540673806, 9783540673804
DOIs
Publication statusPublished - 2000
Event2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of
Duration: 1999 Dec 91999 Dec 10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1787
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Conference on Information Security and Cryptology, ICISC 1999
CountryKorea, Republic of
CitySeoul
Period99/12/999/12/10

Fingerprint

Linear Cryptanalysis
Differential Cryptanalysis
S-box
Block Ciphers
Rijndael
Substitution
Permutation
Substitution reactions
Linearly

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Kang, J. S., Park, C., Lee, S., & Lim, J. I. (2000). On the optimal diffusion layers with practical security against differential and linear cryptanalysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1787, pp. 38-52). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1787). Springer Verlag. https://doi.org/10.1007/10719994_4

On the optimal diffusion layers with practical security against differential and linear cryptanalysis. / Kang, Ju Sung; Park, Choonsik; Lee, Sangjin; Lim, Jong In.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1787 Springer Verlag, 2000. p. 38-52 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kang, JS, Park, C, Lee, S & Lim, JI 2000, On the optimal diffusion layers with practical security against differential and linear cryptanalysis. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 1787, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1787, Springer Verlag, pp. 38-52, 2nd International Conference on Information Security and Cryptology, ICISC 1999, Seoul, Korea, Republic of, 99/12/9. https://doi.org/10.1007/10719994_4
Kang JS, Park C, Lee S, Lim JI. On the optimal diffusion layers with practical security against differential and linear cryptanalysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1787. Springer Verlag. 2000. p. 38-52. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/10719994_4
Kang, Ju Sung ; Park, Choonsik ; Lee, Sangjin ; Lim, Jong In. / On the optimal diffusion layers with practical security against differential and linear cryptanalysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1787 Springer Verlag, 2000. pp. 38-52 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{2e19e206ea1c400b9b077aad3c031b5e,
title = "On the optimal diffusion layers with practical security against differential and linear cryptanalysis",
abstract = "In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.",
author = "Kang, {Ju Sung} and Choonsik Park and Sangjin Lee and Lim, {Jong In}",
year = "2000",
doi = "10.1007/10719994_4",
language = "English",
isbn = "3540673806",
volume = "1787",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "38--52",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - On the optimal diffusion layers with practical security against differential and linear cryptanalysis

AU - Kang, Ju Sung

AU - Park, Choonsik

AU - Lee, Sangjin

AU - Lim, Jong In

PY - 2000

Y1 - 2000

N2 - In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.

AB - In this works we examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical security of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. Moreover, we apply our results to analyze three diffusion layers used in the block ciphers E2, CRYPTON and Rijndael, respectively. It is also shown that these all diffusion layers have achieved optimal security according to their each constraints of using operations.

UR - http://www.scopus.com/inward/record.url?scp=84865518839&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84865518839&partnerID=8YFLogxK

U2 - 10.1007/10719994_4

DO - 10.1007/10719994_4

M3 - Conference contribution

SN - 3540673806

SN - 9783540673804

VL - 1787

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 38

EP - 52

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -