The vulnerability analysis and the security evaluation of block ciphers
The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this p...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English English |
Published: |
2010
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf |
_version_ | 1825945996483362816 |
---|---|
author | Rezaeipour, Davood Md. Said, Mohamad Rushdan |
author_facet | Rezaeipour, Davood Md. Said, Mohamad Rushdan |
author_sort | Rezaeipour, Davood |
collection | UPM |
description | The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and
static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. This paper contains the latest scientific results which are used for evaluation of output sequences of cryptosystems. |
first_indexed | 2024-03-06T07:40:13Z |
format | Article |
id | upm.eprints-17366 |
institution | Universiti Putra Malaysia |
language | English English |
last_indexed | 2024-03-06T07:40:13Z |
publishDate | 2010 |
record_format | dspace |
spelling | upm.eprints-173662015-11-02T08:00:58Z http://psasir.upm.edu.my/id/eprint/17366/ The vulnerability analysis and the security evaluation of block ciphers Rezaeipour, Davood Md. Said, Mohamad Rushdan The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. This paper contains the latest scientific results which are used for evaluation of output sequences of cryptosystems. 2010 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf Rezaeipour, Davood and Md. Said, Mohamad Rushdan (2010) The vulnerability analysis and the security evaluation of block ciphers. International Mathematical Forum, 5 (42). pp. 2071-2075. ISSN 1312-7594 Data encryption (Computer science) Coding theory Ciphers English |
spellingShingle | Data encryption (Computer science) Coding theory Ciphers Rezaeipour, Davood Md. Said, Mohamad Rushdan The vulnerability analysis and the security evaluation of block ciphers |
title | The vulnerability analysis and the security evaluation of block ciphers |
title_full | The vulnerability analysis and the security evaluation of block ciphers |
title_fullStr | The vulnerability analysis and the security evaluation of block ciphers |
title_full_unstemmed | The vulnerability analysis and the security evaluation of block ciphers |
title_short | The vulnerability analysis and the security evaluation of block ciphers |
title_sort | vulnerability analysis and the security evaluation of block ciphers |
topic | Data encryption (Computer science) Coding theory Ciphers |
url | http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf |
work_keys_str_mv | AT rezaeipourdavood thevulnerabilityanalysisandthesecurityevaluationofblockciphers AT mdsaidmohamadrushdan thevulnerabilityanalysisandthesecurityevaluationofblockciphers AT rezaeipourdavood vulnerabilityanalysisandthesecurityevaluationofblockciphers AT mdsaidmohamadrushdan vulnerabilityanalysisandthesecurityevaluationofblockciphers |