Open Access   Article Go Back

A New Perspective of Inferring from the output of Linear Cryptanalysis Attack

D. Bhowmik1 , A. Datta2 , A. Sinha3

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-2 , Page no. 38-42, Feb-2017

Online published on Mar 01, 2017

Copyright © D. Bhowmik, A. Datta, A. Sinha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Bhowmik, A. Datta, A. Sinha , “A New Perspective of Inferring from the output of Linear Cryptanalysis Attack,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.38-42, 2017.

MLA Style Citation: D. Bhowmik, A. Datta, A. Sinha "A New Perspective of Inferring from the output of Linear Cryptanalysis Attack." International Journal of Computer Sciences and Engineering 5.2 (2017): 38-42.

APA Style Citation: D. Bhowmik, A. Datta, A. Sinha , (2017). A New Perspective of Inferring from the output of Linear Cryptanalysis Attack. International Journal of Computer Sciences and Engineering, 5(2), 38-42.

BibTex Style Citation:
@article{Bhowmik_2017,
author = {D. Bhowmik, A. Datta, A. Sinha },
title = {A New Perspective of Inferring from the output of Linear Cryptanalysis Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {38-42},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1175},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1175
TI - A New Perspective of Inferring from the output of Linear Cryptanalysis Attack
T2 - International Journal of Computer Sciences and Engineering
AU - D. Bhowmik, A. Datta, A. Sinha
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 38-42
IS - 2
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
796 699 downloads 535 downloads
  
  
           

Abstract

In this paper the results obtained from Linear Cryptanalysis attack developed by Matsui has been analyzed in a different perspective and inferences were drawn accordingly. Here, a simple toy cipher has been put to Linear Cryptanalysis attack in order to understand the attack from a different perspective. The results thus obtained may become a guide towards designing block ciphers that can withstand Linear Cryptanalysis attacks.

Key-Words / Index Term

Linear Cryptanalysis, Linear Approximation, S-Box, Toy cipher, Parity

References

[1] Heys H M,”A Tutorial on Linear And Differential Cryptanalysis”, Cryptologia, Vol. 25(3),pp189-221, 2002.
[2] Matsui M,”Linear Cr4yptanalysis Method For DES Cipher”, Advance in Cryptlogy-EUROCRYPT’93, Springer, Verlag, 386-397, 1994.
[3] Jakobson B T, Abyar M., Nordholt P S, “Linear And Differential Cryptanalysis”, pp. 234-242, 2006.
[4] Paar, C, Pelzl J, “Understanding Cryptography”, Berlin:Springer, Nerla, pp. 120-129, 2010.
[5] Bhowmik D, Datta A,Sinha S,”Measuring the Diffusion Characteristic of Block Ciphers: The Bit Relationship Test (BRT)”,International Journal of Computer Science and Engineering,Vol.3(1), pp.76-80,Feb 2015.
[6] Sharma A., Thakur RS and Jaloree S., "Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4(6), pp.8-14, Dec 2016.
[7] Shah R. and Chouhan Y. S., "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2(1), pp.22-28, Feb 2014.
[8] Bhowmick A., Kapur V. and Paladi S.T., "Concealing Cipher Data using an Amalgam of Image Steganography and two-level Image Cryptography", International Journal of Computer Sciences and Engineering, Vol.3(3), pp.7-12, Mar -2015.