Abstract
This paper presents a multiplication-addition structure in finite field that can be used in constructing round fimction F of the Generalized DES-like iterated cipher to strengthen ability against the differential attack. Four special round functions based on this multiplication-addition structure are investigated. It is proved that the probability of one round differential of any of these four round functions reaches its possible minimum respectively. Thus their corresponding ciphers are immune to differential cryptanalysis in a few rounds. Some practical consideration in the implementation of the generalized DES-like iterated cipher and IDEA-like iterated cipher are also given.
Preview
Unable to display preview. Download preview PDF.
References
X.Lai, J.massey, and S.Murphy. Markov cipher and differential cryptanalysis. Advances in Cryptology-CRYPTO'91. Lecture Notes in Computer Science, Vol. 547 Springer-Verlag, Berlin, 1992,pp.17–38.
E.Biham and Shamir. Differential cryptanalysis of DES-like systems. Journal of Cryptology, Vol4,No.1,1991,pp.3–72.
E.Biham and A.Shamir. Differential cryptanalysis of the full 16-round DES, Advances in Cryptology: Proceeding of CRYPTO'92, Springer-Verlag, Berlin, 1993, pp. 487–496.
Kaisa Nyberg and Lars Ramkilde Knudsen. Provable security against a differential attack, Journal of Cryptology, Vol8,1995,pp.27–37.
E.Biham and AShamir. Differential cryptanalysis of FÉAL and N-Hash, Advances in Cryptology: Proceeding of EUROCRYPTO'91, Springer-Verlag, Berlin, 1991, pp. 1–16
E.Biham and AShamir. Differential cryptanalysis of Snefru, Khafre,REDOC-II, LOKI, and Lucifer, Advances in Cryptology: Proceeding of CRYPTO'91, 1992, pp. 156–171
L.Brown, M.Kwan,J.Pieprzyk and J.Seberr. Improving resistance to differential cryptanalysis and the redesign of LOKI, Proceeding of ASIACRYPTO'91, 1992, pp. 28–30
T.KANEKO,K.KOYAMA and R.TERADA Dynamic swapping schemes and differential cryptanalysis, IIEE Trans. fundamentals Vol.E77-a No.8,1994, pp1328–1335
Feng Zhu and Bao-An Guo. A block-ciphering algorithm based on addition-multiplication structure in GF(2n), the 4th in a series of annual workshops on selected areas in cryptograph, Ottawa, 1997.
Author information
Authors and Affiliations
Editor information
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Zhu, F., Guo, BA. (1997). A multiplication-addition structure against differential attack. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028480
Download citation
DOI: https://doi.org/10.1007/BFb0028480
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63696-0
Online ISBN: 978-3-540-69628-5
eBook Packages: Springer Book Archive