Dynamic Network using Symmetric Block Cipher

  • Published : 2005.03.01

Abstract

Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard. In this paper we propose a new network called Dynamic network for symmetric block ciphers.

Keywords

References

  1. E. Biham and A. Shamir, 'Differential Cryptanalysis of DES-like cryptosystems', Advances in Cryptology CRYPTO '90, LNCS 537, pp. 2-21,1990
  2. E. Biham and A. Shamir, 'Differential Cryptanalysis of Feal and Hash', Advances in Cryptology EUROCRYPT '91, LNCS 547, pp. 1-16, 1991
  3. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993
  4. B. S. Kaliski and Y. L. Yin, 'On differential and linear cryptanalysis of the RC5 encryption', Advances in Cryptology - CRYPTO '95, LNCS 963, pp. 171-184,1995
  5. L. R. Knudsen, 'Practically Secure Feistel Ciphers, Fast Software Encryption', Cambridge Security Workshop Proceedings, pp. 211-221, 1994
  6. M. Matsui, 'Linear Cryptanalysis Method for DES Cipher', Advances in Cryptology - EUROCRYPT '93, LNCS 765, pp. 386-397,1993
  7. M. Matsui, 'The first experimental cryptanalysis of the Data Encryption Standard', Advances in Cryptology - CRYPTO '94, LNCS 839, pp. 1-11, 1994
  8. A J. Menezes, P. C. Oorschot, and S. A Vanstone, Applied Cryptography, CRC Press, 1997
  9. K. Ohta, S. Moriai, and K. Aoki, 'Improving the Search Algorithm for the Best Linear Expression', Advances in Cryptology - EUROCRYPT '95, LNCS 963,pp. 157-170, 1995
  10. R. L. Rivest, 'The RC5 encryption algorithm', Fast Software Encryption, Second International Workshop, LNCS1008, pp. 86-96, Springer-Verlag, 1995
  11. B. Schneier, Applied cryptography, John Wiley Sons, 1996
  12. B. Schneier and J. Kelsey, 'Unbalanced Feistel Networks and Block-Cipher Design', Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 121-144, 1996
  13. C.E. Shannon, 'Communication theory of secrecy systems', Bell System Technical Journal, v. 27, n. 4, pp. 379-423, 1948 https://doi.org/10.1002/j.1538-7305.1948.tb01338.x