An Approach of Zero Correlation Linear Cryptanalysis

Abstract

Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which are resistant against Differential and Linear Cryptanalysis may not be immune to their latest extensions such as Impossible Differential Cryptanalysis (IDC) and Zero Correlation Linear Cryptanalysis (ZCLC). These techniques use the statistics of distinguishing the correct key and incorrect key from probability distribution of impossible differentials and linear approximation respectively. Most of IDC and ZCLC are based on miss in middle technique and are independent of non linear components. In this paper, the method used by ZCLC is explained and the block ciphers which have been attacked by ZCLC and multidimensional ZCLC have been stated. The links between IDC and ZCLC have been also projected.

Authors and Affiliations

Mehak Khurana , Meena Kumari

Keywords

Related Articles

Centralized Bandwidth Distribution And Utility Provider

This paper is focused the problem faced by large offices and companies. It is helpful to keep observation on employees work for saving companies valuable time. Also it can control his activity. It provides server desktop...

System for Devices mobile based in recognition facial

In this paper is documents the development of the work of a security system for mobile devices based on Facial recognition. This recognition is based on the algorithm of Wu and SUSAN, it was obtained for 80% efficiency a...

A review of Coupling and Cohesion metrics in Object Oriented Environment

Software metrics are used to check and evaluate various aspects of the complexity of a software product. Coupling and Cohesion are considered to be the most important attributes. The increasing need for software quality...

A novel high-speed image processing technique for detecting edges using abs- Laplacian kernel

Delineating patterns that are alike or in other words, detecting edges that separates them is the most critical step in image processing. There are various methods available e.g Sobel, Prewitt, Canny based edge detection...

Modified Reliable Energy Aware Routing Protocol For Wireless Sensor Network

In this paper, a novel reliable energy aware routing protocol is proposed, which is based on reliability and energy efficiency. Since in the wireless environment, link quality is difficult to guarantee, the reliable rout...

Download PDF file
  • EP ID EP123321
  • DOI -
  • Views 137
  • Downloads 0

How To Cite

Mehak Khurana, Meena Kumari (2016). An Approach of Zero Correlation Linear Cryptanalysis. International Journal of Computer Science & Engineering Technology, 7(5), 228-232. https://www.europub.co.uk/articles/-A-123321