An Approach of Zero Correlation Linear Cryptanalysis
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which are resistant against Differential and Linear Cryptanalysis may not be immune to their latest extensions such as Impossible Differential Cryptanalysis (IDC) and Zero Correlation Linear Cryptanalysis (ZCLC). These techniques use the statistics of distinguishing the correct key and incorrect key from probability distribution of impossible differentials and linear approximation respectively. Most of IDC and ZCLC are based on miss in middle technique and are independent of non linear components. In this paper, the method used by ZCLC is explained and the block ciphers which have been attacked by ZCLC and multidimensional ZCLC have been stated. The links between IDC and ZCLC have been also projected.
Authors and Affiliations
Mehak Khurana , Meena Kumari
An Overview on the Architecture of WhatsApp
WhatsApp Messenger Application is a messaging application that uses the Internet to connect to the person whose number is registered with WhatsApp Account. Various Databases have been used in the distributed applications...
PERIODICITY DETECTION ALGORITHMS IN TIME SERIES DATABASES-A SURVEY
Periodicity mining is used for predicting different applications such as prediction,forcasting etc.It has several application in Timeseries databases.Several algorithms are present for detecting the periodicity.But most...
THE IMPLEMENTATION OF PROGRAMMABLE WIRELESS ROUTER USING JAVA
Nowadays available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If th...
A Survey on Feedback base Trust Evaluation for Cloud Environment
Cloud computing widely adopted by enterprises and individuals. Cloud computing provide several advantages but still there are many obstacles in cloud. Trust plays major role in commercial cloud environments. In the envir...
Exploration of Ubiquitous Computing and its Applications in Various Arenas
Ubiquitous Computing is all about how people can interact with heterogeneous devices such as computer, mobile, Personal Digital Assistants (PDAs), tabs, small sensors without explicitly instructing these gadgets and few...