The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The P-permutation plays an important role in the round function of the block cipher, the MDS codes have been used to design the P-permutations with good characteristics in encryption-system for a long term. This paper finds two types of generated matrix of MDS codes viz. Vandermonde and Cauchy matrices, it gives two kinds of methods based on Vandermonde matrix and Cauchy matrix to construct good P-permutations...
Orthomorphism is a kind of elementary permutation with good cryptographic properties, which can be used for constructing the S-box in block cipher structure. This paper mainly discussed constructing some orthomorphisms with evolutionary computation, and got some orthomorphisms with high nonlinearity and low difference uniformity by evolutionary algorithm in the open documents for the first time.
Serpent is an SP network block cipher submitted to the AES competition and chosen as one of its five finalists. The security of serpent is widely acknowledged, especially as the best known attack so far is a differential-linear attack on only 11 rounds out of the 32 rounds of the cipher. This paper proposed impossible differential-algebraic cryptanalysis of 11-round Serpent using the key arrangement...
Serpent is a block cipher which was suggested as a candidate for the advanced encryption standard (AES). Several recently proposed ciphers are built with layers of small S-boxes, interconnected by linear key-dependent layers. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an over defined system of algebraic equations. We study general...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.