CFP last date
20 May 2024
Reseach Article

Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method

by Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 21
Year of Publication: 2013
Authors: Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A
10.5120/10593-5748

Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A . Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method. International Journal of Computer Applications. 63, 21 ( February 2013), 47-52. DOI=10.5120/10593-5748

@article{ 10.5120/10593-5748,
author = { Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A },
title = { Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 21 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 47-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number21/10593-5748/ },
doi = { 10.5120/10593-5748 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:00.608075+05:30
%A Rajashekarappa
%A K M Sunjiv Soyjaudah
%A Sumitra Devi K A
%T Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 21
%P 47-52
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper presents the Linear Cryptanalysis on S-DES and Symmetric Block Ciphers Using Hill Cipher Method. As a vehicle of demonstration of this concept, choose simple yet representative block ciphers such as computationally tractable versions of S-DES, for the studies. The attack presented in this paper is applicable to block structure independently of the key scheduling. The attack needs distinct known plaintexts which are a more realistic attack model in comparison with impossible differential cryptanalysis which uses chosen plaintext pairs. Moreover, linear cryptanalysis on simplified data encryption standard performed simulations on a small variant block and present the experimental results on the theoretical model of the multidimensional linear cryptanalysis using Hill Cipher method.

References
  1. Rajashekarappa, Dr K M Sunjiv Soyjaudah, 2012, ICIP, Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search Method, pp. 561-568, ©Springer-Verlag Berlin Heidelberg.
  2. Biham, E. , and Shamir, A, 1993, Differential Cryptanalysis of the Data Encryption Standard. NewYork: Springer-Verlag.
  3. Comppersmith, D, May, 1994, "The Data Encryption Standard (DES) and Its Strength Against Attacks", IBM Journal of Research and Development.
  4. Matsui, M,1993, "Linear Cryptanalysis Method for DES Cipher. " Proceedings, EUROCRYPT '93, published by Springer-Verlag.
  5. Barker, W, 1991,Introduction to the Analysis of the Data Encryption Standard (DES). Laguna Hills, CA: Aegean Park Press.
  6. Electronic Frontier Foundation, 1998, Cracking DES: Secrets of Encryption Research,Wiretap Politics, and Chip Design. Sebastopol, CA: O'Reilly.
  7. BibhudendraAcharya, GirijaSankarRath, Sarat Kumar Patra, Saroj Kumar Panigrahy, 2007, "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm", International Journal of Security, Vol 1, Issue 1, pp. 14-21.
  8. William Stallings, 1989, "Cryptography and Network Security Principles and Practices", Fourth edition, McGraw- Hill, 2003. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science.
  9. Behrouz A. Forouzan, 2006, "Cryptography and Network Security", Firstedition, McGraw- Hill.
  10. Atul Kahate, 2003, "Cryptography and Network Security", TMH.
  11. Rajashekarappa and Dr. K M S Soyjaudah, 2012, "Heuristic Search Procedures for Cryptanalysis and Development of Enhanced Cryptographic Techniques" Published at International Journal of Modern Engineering Research (IJMER), Vol. 2, Issue. 3, pp-949-954.
  12. Poonam, G, 2009, "Crypatanalysis of SDES via Evolutionary Computation Techniques". International Journal of Computer Science and Information Security 1(1).
  13. Chanas, S. , Kobylanski, P, 1996, A New Heuristic Algorithm Solving the Linear Ordering Problem. Computational Optimization and Applications 6, 191–205.
  14. Ayman M. B. Albassal, Abdel-Moneim A. Wahdan, 2004, Genetic Algorithm Cryptanalysis of a Fiestel Type Block Cipher, International Conference on Electrical, Electronic and Computer Engineering, Egypt, PP. 217–221.
  15. Garg, P, 2010, Evolutionary Computation Algorithms for Cryptanalysis: A Study, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 7, No. 1.
  16. Coppersmith, D, 1994, "The Data Encryption Standard (DES) and Its Strength Against Attacks. " IBM Journal of Research and Development.
  17. Rajashekarappa, Dr K M Sunjiv Soyjaudah, 2012, Comparative Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search and Simulated Annealing Methods, International Journal of Engineering Research and Development, pp. 07-12.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Data Encryption Standard Linear Cryptanalysis