DocumentCode :
2268089
Title :
Breaking block and product ciphers applied across byte boundaries
Author :
Carlson, Albert H. ; Hiromoto, Robert E. ; Wells, Richard B.
Author_Institution :
Validus Technol. Corp., Concord, CA, USA
Volume :
2
fYear :
2011
fDate :
15-17 Sept. 2011
Firstpage :
733
Lastpage :
736
Abstract :
The security of block and product ciphers is considered using a set theoretic estimation (STE) approach to decryption. Known-ciphertext attacks are studied using permutation (P) and substitution (S) keys. The blocks are formed form three (3) alphabetic characters (metacharacters) where the applications of P and S upon the ASCII byte representation of each of the three characters are allowed to cross byte boundaries. The application of STE forgoes the need to employ chosen-plaintext or known-plaintext attacks.
Keywords :
cryptography; set theory; ASCII byte representation; STE approach; alphabetic character; block cipher; byte boundaries; ciphertext attack; decryption; metacharacter; permutation; product cipher; set theoretic estimation; substitution keys; Compounds; Encryption; Estimation; Information theory; Noise; Set theoretic estimation; block and product cipher; byte boundaries; known ciphertext attack; metacharacters;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), 2011 IEEE 6th International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4577-1426-9
Type :
conf
DOI :
10.1109/IDAACS.2011.6072867
Filename :
6072867
Link To Document :
بازگشت