An Approach of Zero Correlation Linear Cryptanalysis
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which are resistant against Differential and Linear Cryptanalysis may not be immune to their latest extensions such as Impossible Differential Cryptanalysis (IDC) and Zero Correlation Linear Cryptanalysis (ZCLC). These techniques use the statistics of distinguishing the correct key and incorrect key from probability distribution of impossible differentials and linear approximation respectively. Most of IDC and ZCLC are based on miss in middle technique and are independent of non linear components. In this paper, the method used by ZCLC is explained and the block ciphers which have been attacked by ZCLC and multidimensional ZCLC have been stated. The links between IDC and ZCLC have been also projected.
Authors and Affiliations
Mehak Khurana , Meena Kumari
Centralized Bandwidth Distribution And Utility Provider
This paper is focused the problem faced by large offices and companies. It is helpful to keep observation on employees work for saving companies valuable time. Also it can control his activity. It provides server desktop...
System for Devices mobile based in recognition facial
In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...
A review of Coupling and Cohesion metrics in Object Oriented Environment
Software metrics are used to check and evaluate various aspects of the complexity of a software product. Coupling and Cohesion are considered to be the most important attributes. The increasing need for software quality...
A novel high-speed image processing technique for detecting edges using abs- Laplacian kernel
Delineating patterns that are alike or in other words, detecting edges that separates them is the most critical step in image processing. There are various methods available e.g Sobel, Prewitt, Canny based edge detection...
Modified Reliable Energy Aware Routing Protocol For Wireless Sensor Network
In this paper, a novel reliable energy aware routing protocol is proposed, which is based on reliability and energy efficiency. Since in the wireless environment, link quality is difficult to guarantee, the reliable rout...