?
Расстояние единственности как определяющее свойство блочного шифра
С. 164–166.
Chukhno A., Расторгуева М. С.
Keywords: блочный шифр
Chukhno A., Курочкин А. В., Фомичев В. М., Прикладная дискретная математика. Приложение 2022 Т. 15 С. 73–77
In this paper, new results of the analysis of the KB 256-3 block cipher algorithm are outlined. We set up a difference relation with probability 1 for the six-round algorithm under study and propose a key recovery method using this difference relation for the nine-round KB 256-3 algorithm. We construct an impossible differential for the ...
Added: May 6, 2024
Chukhno A., Курочкин А. В., Бобровский Д. А., Прикладная дискретная математика. Приложение 2023 Т. 16 С. 56–57
Построено разностное соотношение для алгоритма шифрования КБ-256. Вероятность его выполнения для 15 из 16 раундов не меньше чем 2−1342−134. ...
Added: May 6, 2024
Chukhno A., Дмух А. А., Astrakhantsev R. et al., Journal of Computer Virology and Hacking Techniques 2024
In this paper differences with probability 1 were found for 6 and 7 rounds of KB-256 block cipher. Also using Biham’s et al. shrinking technique we find more than 1700 impossible differentials for the KB-256 cipher with number of rounds from 8 up to 18 (2 rounds more than in the original KB-256) ...
Added: May 6, 2024
Perov A., Инновации в жизнь 2016 № 2(17) С. 89–97
The statistical analysis of iterative block ciphers is carried out for detection of dependences of statistical properties of output sequence depending on number of rounds. It is reasonable to utilize source codes available in the Internet, but their integration into own programs is impeded by at least the following reasons. Firstly, different implementations have different ...
Added: November 1, 2021
Perov A., Вестник НГУЭУ 2016 № 3 С. 290–298
A survey of some important scientic directions in the sphere of symmetric cryptography is presented. We emphasize problems connected with weak keys, with statistical analysis of symmetric algorithms and with investigation of iterative constructions. Some problems, specic to stream ciphers, iterative block ciphers and cryptographic hash-functions, are considered. We also advocate practical significance of scientic ...
Added: November 1, 2021
Perov A., Пестунов А. И., Прикладная дискретная математика 2020 № 3 С. 46–56
The paper explores possibility of applying convolutional neural networks to the security analysis of iterative block ciphers. A new approach for constructing distinguishing
attacks based on a convolutional neural network is proposed. The approach is based
on distinguishing between graphic equivalents of ciphertexts received by the CTR
(counter) encryption mode after different number of rounds, including the number
of ...
Added: November 1, 2021
Авраамова О. Д., Fomin D., Серов В. А. et al., Математические вопросы криптографии 2021 Vol. 12 No. 2 P. 21–38
In this paper we consider a bit-sliced implementation of the non-linear transformation shared by GOST R 34.12-2015 “Kuznyechik” block cipher and GOST R 34.11-2012 “Streebog” hash function. We combine analytical and computer methods to get a 226 Boolean operations representation. ...
Added: July 26, 2021
Fomin D., Математические вопросы криптографии 2015 Vol. 6 No. 2 P. 99–108
In this article we consider NVIDIA GPU implementation aspects of an XSL block cipher over the finite field with MDS-matrix linear transformation. We compare obtained results with some other block ciphers. ...
Added: May 4, 2019
Дали Ф. А., Маршалко Г. Б., Mironkin V., Проблемы информационной безопасности. Компьютерные системы 2017 № 3 С. 87–90
In this paper we study rotational probabilities for 2-GOST block cipher, which is a modification of GOST 28147-89. We show that despite the fact that this algorithm does not belong to the family of ARX-transformations in some cases it is possible to evaluate its rotational properties and evaluate the applicability of rotational analysis. ...
Added: January 27, 2018
Avdoshin S. M., Набебин А. А., М.: ДМК Пресс, 2017.
The textbook contains necessary information about universal and classical algebras, systems of axioms for the basic algebraic structures (groupoid, monoid, semi-groups, groups, partial orders, rings, fields). The basic cryptographic algorithms are described. Error-correcting codes - linear, cyclic, BCH are considered. Algorithms for designing of such codes are given. Many examples are shown. It is put ...
Added: August 19, 2016