Skip to main content

A multiplication-addition structure against differential attack

  • Session 8: Block Ciphers
  • Conference paper
  • First Online:
Information and Communications Security (ICICS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1334))

Included in the following conference series:

Abstract

This paper presents a multiplication-addition structure in finite field that can be used in constructing round fimction F of the Generalized DES-like iterated cipher to strengthen ability against the differential attack. Four special round functions based on this multiplication-addition structure are investigated. It is proved that the probability of one round differential of any of these four round functions reaches its possible minimum respectively. Thus their corresponding ciphers are immune to differential cryptanalysis in a few rounds. Some practical consideration in the implementation of the generalized DES-like iterated cipher and IDEA-like iterated cipher are also given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. X.Lai, J.massey, and S.Murphy. Markov cipher and differential cryptanalysis. Advances in Cryptology-CRYPTO'91. Lecture Notes in Computer Science, Vol. 547 Springer-Verlag, Berlin, 1992,pp.17–38.

    Google Scholar 

  2. E.Biham and Shamir. Differential cryptanalysis of DES-like systems. Journal of Cryptology, Vol4,No.1,1991,pp.3–72.

    Article  Google Scholar 

  3. E.Biham and A.Shamir. Differential cryptanalysis of the full 16-round DES, Advances in Cryptology: Proceeding of CRYPTO'92, Springer-Verlag, Berlin, 1993, pp. 487–496.

    Google Scholar 

  4. Kaisa Nyberg and Lars Ramkilde Knudsen. Provable security against a differential attack, Journal of Cryptology, Vol8,1995,pp.27–37.

    Article  Google Scholar 

  5. E.Biham and AShamir. Differential cryptanalysis of FÉAL and N-Hash, Advances in Cryptology: Proceeding of EUROCRYPTO'91, Springer-Verlag, Berlin, 1991, pp. 1–16

    Google Scholar 

  6. E.Biham and AShamir. Differential cryptanalysis of Snefru, Khafre,REDOC-II, LOKI, and Lucifer, Advances in Cryptology: Proceeding of CRYPTO'91, 1992, pp. 156–171

    Google Scholar 

  7. L.Brown, M.Kwan,J.Pieprzyk and J.Seberr. Improving resistance to differential cryptanalysis and the redesign of LOKI, Proceeding of ASIACRYPTO'91, 1992, pp. 28–30

    Google Scholar 

  8. T.KANEKO,K.KOYAMA and R.TERADA Dynamic swapping schemes and differential cryptanalysis, IIEE Trans. fundamentals Vol.E77-a No.8,1994, pp1328–1335

    Google Scholar 

  9. Feng Zhu and Bao-An Guo. A block-ciphering algorithm based on addition-multiplication structure in GF(2n), the 4th in a series of annual workshops on selected areas in cryptograph, Ottawa, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yongfei Han Tatsuaki Okamoto Sihan Qing

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Zhu, F., Guo, BA. (1997). A multiplication-addition structure against differential attack. In: Han, Y., Okamoto, T., Qing, S. (eds) Information and Communications Security. ICICS 1997. Lecture Notes in Computer Science, vol 1334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028480

Download citation

  • DOI: https://doi.org/10.1007/BFb0028480

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63696-0

  • Online ISBN: 978-3-540-69628-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics