Skip to main content

Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2908))

Abstract

In this paper, we construct a 16 × 16 involution binary matrix of branch number 8 and estimate security of an 128-bit SPN(a substitution and permutation encrypion network) block cipher which uses the matrix as a diffusion layer in a round function. We show how to construct such an involution binary matrix of branch number 8, and use some mathematical techniques to find a form in product of matrices, which is for increasing efficiency in software implementations. We also show that the cryptanalytic properties such as the resistance to differential, linear, impossible differential, and truncated differential cryptanalysis.

This research is supported by Hanyang University and National Security Research Institute(NSRI), Korea

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  2. Heys, H.M., Tavares, S.E.: Avalanche characteristics of substitution-permutation encryption networks. IEEE Trans. Comp. 44, 1131–1139 (1995)

    Article  MATH  Google Scholar 

  3. Litsyn, S., Rains, E.M., Sloane, N.J.A.: Available at http://www.math.unl.edu/djaffe/codes/webcodes/codeform.html

  4. Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K., Ohta, K.: A strategy for construction fast round functions with practical security against differential and linear cryptanalysis. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 264–279. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Kanda, M.: Practical Security Evaluation against Differential and Linear Cryptanalysis for Feistel Ciphers with SPN Round Function. In: Selected Areas in Cryptography 2000, pp. 324–338 (2000)

    Google Scholar 

  6. Koo, B., Song, J.: Construction a diffusion layer in SPN structure against differential and linear cryptanalysis. In: Proceedings of KIISC conference Region Chung-Cheong, pp. 23–39 (2002)

    Google Scholar 

  7. Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)

    Google Scholar 

  8. NTT Laboratories. Security of E2 against Truncated Differential Cryptanalysis(in progress) (1999), available at http://info.isl.ntt.co.jp/e2/RelDocs/

  9. Aoki, K., Kanda, M.: Search for impossible Differential of E2 (1999), available at http://csrc.nist.gov/CryptoToolkit/aes/round1/pubcmnts.htm

  10. Daemen, J., Rijmen, V.: AES proposal:Rijndael(Version 2) (1999), Available at NIST AES website http://csrc.nist.gov/encryption/aes

  11. Knudsen, L.R.: The Number of Rounds in Block Ciphers, NESSIE public reports, NES/DOC/UIB/WP3/003/a (2000), Available at http://www.cosic.esat.kuleuven.ac.be/nessie/reports/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koo, B.W., Jang, H.S., Song, J.H. (2004). Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24591-9_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20827-3

  • Online ISBN: 978-3-540-24591-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics