Article

Article title ANALYSIS OF SIMMETRIC CRYPTOSYSTEMS
Authors L.K. Babenko, E.A. Ischukova
Section SECTION IV. METHODS AND CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 12, 2012 @en
Index UDC 681.03.245
DOI
Abstract Article considers the main aspects of application of modern methods of cryptanalysis for an assessment of strength of symmetric block algorithms of enciphering. Considering include such methods of the analysis as linear, differential, algebraic analyses and slide attack. The different variants of analysis of AES are considered. It is described what the Birthday Paradox is and what is its role in the information security. The special attention is given to questions of possibility of using of the distributed multiprocessing calculations for reduction of time of the analysis.

Download PDF

Keywords Сryptography; cryptanalysis; symmetric cipher; secret key; block cipher; strength; multiprocessing calculations.
References 1. Грушо А.А., Тимонина Е.Е., Применко Э.А. Анализ и синтез криптоалгоритмов. Курс лекций. – Йошкар-Ола: Изд-во МФ МОСУ, 2000.
2. Столлингс В. Криптография и защита сетей: принципы и практика. – 2-е изд.: Пер. с англ. – М.: Изд. дом «Вильямс», 2001.
3. Бабенко Л.К. Ищукова Е.А. Современные алгоритмы блочного шифрования и методы их анализа. – М.: Гелиос АРВ, 2006.
4. Шнайер Б. Прикладная криптография: Протоколы, алгоритмы, исходные тексты на языке Си. – М.: ТРИУМФ, 2002. – 648 c.
5. Matsui M., Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology. – EUROCRYPT’93, Springer-Verlag, 1998. – 386 p.
6. Biham E., Shamir A., Differential Cryptanalysis of the Full 16-round DES // Crypto'92, Springer-Velgar, 1998. – P. 487.
7. Biham E., Shamir A. Differential Cryptanalysis of DES-like Cryptosystems. Extended Abstract // Crypto'90, Springer-Velgar, 1998. – P. 2.
8. Панасенко С. Алгоритмы шифрования. Специальный справочник. – СПб.: БХВ-Петербург, 2009. – 576 с.
9. Courtois N., Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations // ASIACRYPT, 2002. – P. 267-287.
10. Courtois N., Klimov A., Patarin J., Shamir A. Efficient algorithms for solving overdefined systems of multivariate polynomial equations // EUROCRYPT, 2000. – P. 392-407.
11. Courtois N., Gregory V. Bard. Algebraic Cryptanalysis of the Data Encryption Standard // 11-th IMA Conference, 2007. – P. 152-169.
12. Kleiman E. The XL and XSL attacks on Baby Rijndael //http://orion.math.iastate.edu/dept/thesisarchive/MS/EKleimanMSSS05.pdf.
13. Бабенко Л.К., Маро Е.А., Алгебраический криптоанализ упрощенного алгоритма шифрования Rijndael // Известия ЮФУ. Технические науки. – 2009. – № 11 (100). – С. 187-199.
14. Daemen J., Rijmen V. AES Proposial: Rijndael. http://csrc.nist.gov/encryption/aes.
15. Зензин О.С., Иванов М.А. Стандарт криптографической защиты – AES. Конечные поля. – М.: КУДИЦ-ОБРАЗ, 2002.
16. Birukov A., Wagner D. Advanced Slide Attacks – http://www.csberkeley.cdu~daw/papers/advslide-ec00.ps.

Comments are closed.