The vulnerability analysis and the security evaluation of block ciphers

The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this p...

Full description

Bibliographic Details
Main Authors: Rezaeipour, Davood, Md. Said, Mohamad Rushdan
Format: Article
Language:English
English
Published: 2010
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf
_version_ 1825945996483362816
author Rezaeipour, Davood
Md. Said, Mohamad Rushdan
author_facet Rezaeipour, Davood
Md. Said, Mohamad Rushdan
author_sort Rezaeipour, Davood
collection UPM
description The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. This paper contains the latest scientific results which are used for evaluation of output sequences of cryptosystems.
first_indexed 2024-03-06T07:40:13Z
format Article
id upm.eprints-17366
institution Universiti Putra Malaysia
language English
English
last_indexed 2024-03-06T07:40:13Z
publishDate 2010
record_format dspace
spelling upm.eprints-173662015-11-02T08:00:58Z http://psasir.upm.edu.my/id/eprint/17366/ The vulnerability analysis and the security evaluation of block ciphers Rezaeipour, Davood Md. Said, Mohamad Rushdan The first step for evaluation of block ciphers is the confidence on attainment of some properties such as completeness, strict avalanche criterion and static information leakage. The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. This paper contains the latest scientific results which are used for evaluation of output sequences of cryptosystems. 2010 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf Rezaeipour, Davood and Md. Said, Mohamad Rushdan (2010) The vulnerability analysis and the security evaluation of block ciphers. International Mathematical Forum, 5 (42). pp. 2071-2075. ISSN 1312-7594 Data encryption (Computer science) Coding theory Ciphers English
spellingShingle Data encryption (Computer science)
Coding theory
Ciphers
Rezaeipour, Davood
Md. Said, Mohamad Rushdan
The vulnerability analysis and the security evaluation of block ciphers
title The vulnerability analysis and the security evaluation of block ciphers
title_full The vulnerability analysis and the security evaluation of block ciphers
title_fullStr The vulnerability analysis and the security evaluation of block ciphers
title_full_unstemmed The vulnerability analysis and the security evaluation of block ciphers
title_short The vulnerability analysis and the security evaluation of block ciphers
title_sort vulnerability analysis and the security evaluation of block ciphers
topic Data encryption (Computer science)
Coding theory
Ciphers
url http://psasir.upm.edu.my/id/eprint/17366/1/The%20vulnerability%20analysis%20and%20the%20security%20evaluation%20of%20block%20ciphers.pdf
work_keys_str_mv AT rezaeipourdavood thevulnerabilityanalysisandthesecurityevaluationofblockciphers
AT mdsaidmohamadrushdan thevulnerabilityanalysisandthesecurityevaluationofblockciphers
AT rezaeipourdavood vulnerabilityanalysisandthesecurityevaluationofblockciphers
AT mdsaidmohamadrushdan vulnerabilityanalysisandthesecurityevaluationofblockciphers