- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
S-box design considering the security against known attacks on block ciphers
-
- MORIAI Shiho
- NTT Information and Communication Systems Laboratories
-
- AOKI Kazumaro
- NTT Information and Communication Systems Laboratories
-
- KANDA Masayuki
- NTT Information and Communication Systems Laboratories
-
- TAKASHIMA Youichi
- NTT Human Interface Systems Laboratories
-
- OHTA Kazuo
- NTT Information and Communication Systems Laboratories
Bibliographic Information
- Other Title
-
- 既知のブロック暗号攻撃に対する安全性を考慮した S-box の構成法
Search this article
Description
The short-cut attacks on block ciphers usually exploit the invulnerability of the S-boxes to analyze the algorithm. Thus, when designing a block cipher with no vulnerability to these attacks, how to construct S-boxes is an important issue. This paper presents S-box design criteria for differential attack, linear attack, higher order differential attack, interpolation attack, and partitioning attack. We show how the s-box in the block cipher E2 was designed considering security against the attacks above. We also evaluate the security of E2 against higher order differential attack, interpolation attack, and partitioning attack.
Journal
-
- Technical report of IEICE. ISEC
-
Technical report of IEICE. ISEC 98 (227), 25-32, 1998-07-30
The Institute of Electronics, Information and Communication Engineers
- Tweet
Keywords
Details 詳細情報について
-
- CRID
- 1573950402106747520
-
- NII Article ID
- 110003297311
-
- NII Book ID
- AN10060811
-
- Text Lang
- ja
-
- Data Source
-
- CiNii Articles