Back to Search
Start Over
Key-Dependent S-Box Manipulations
- Source :
- Selected Areas in Cryptography ISBN: 9783540658948, Selected Areas in Cryptography
- Publication Year :
- 1999
- Publisher :
- Springer Berlin Heidelberg, 1999.
-
Abstract
- This paper discusses a method of enhancing the security of block ciphers which use s-boxes, a group which includes the ciphers DES, CAST-128, and Blowfish. We focus on CAST-128 and consider Blowfish; Biham and Biryukov [2] have made some similar proposals for DES. The method discussed uses bits of the primary key to directly manipulate the s-boxes in such a way that their contents are changed but their cryptographic properties are preserved. Such a strategy appears to significantly strengthen the cipher against certain attacks, at the expense of a relatively modest one-time computational procedure during the set-up phase. Thus, a stronger cipher with identical encryption / decryption performance characteristics may be constructed with little additional overhead or computational complexity.
- Subjects :
- Block cipher mode of operation
Triple DES
S-box
Theoretical computer science
Differential cryptanalysis
CBC-MAC
Blowfish
Computer science
business.industry
Cryptography
Two-square cipher
Impossible differential cryptanalysis
Encryption
Higher-order differential cryptanalysis
Cipher
Digital signature
Strong cryptography
Linear cryptanalysis
business
Block size
Key schedule
3-Way
Skipjack
Transposition cipher
Block cipher
Subjects
Details
- ISBN :
- 978-3-540-65894-8
- ISBNs :
- 9783540658948
- Database :
- OpenAIRE
- Journal :
- Selected Areas in Cryptography ISBN: 9783540658948, Selected Areas in Cryptography
- Accession number :
- edsair.doi...........95a6def988edc5570844c8def9e1a979