A large block cipher using linear congruences

被引:0
|
作者
Sastry, V. U. K.
Janaki, V.
机构
关键词
external key; internal key; linear congruences; modular arithmetic inverse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we have modified the Hill cipher by using linear congruences. In this analysis we have two secret keys: (1) the key matrix, and (2) the key involving the constants occurring in the linear congruences. These two keys are termed as outer key and inner key respectively. From the cryptanalysis carried out in this paper, we have found that the inner key plays a very significant role in strengthening the cipher..
引用
收藏
页码:294 / 298
页数:5
相关论文
共 50 条
  • [1] Linear cryptanalysis of NUSH block cipher
    吴文玲
    冯登国
    ScienceinChina(SeriesF:InformationSciences), 2002, (01) : 59 - 67
  • [2] Linear cryptanalysis of NUSH block cipher
    Wu, WL
    Feng, DG
    SCIENCE IN CHINA SERIES F, 2002, 45 (01): : 59 - 67
  • [3] Linear cryptanalysis of NUSH block cipher
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2002, 45 (1): : 59 - 67
  • [4] Linear cryptanalysis of block cipher Xenon
    Tokita, T
    Matsui, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01) : 13 - 18
  • [5] Linear Cryptanalysis of ARIA Block Cipher
    Liu, Zhiqiang
    Gu, Dawu
    Liu, Ya
    Li, Juanru
    Li, Wei
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 242 - +
  • [6] Enhanced Security for Cloud Storage using Linear Block Cipher Algorithm
    Kuppuswamy, Prakash
    Rekha, S. Nithya
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 108 - 112
  • [7] Improved Linear Cryptanalysis of Block Cipher BORON
    Lv, Yin
    Shi, Danping
    Hu, Lei
    Guo, Zihui
    Guo, Yi
    Wang, Caibing
    COMPUTER JOURNAL, 2024, 67 (01): : 210 - 219
  • [8] Differential and linear cryptanalysis of AC block cipher
    Wu, Wen-Ling
    Ma, Heng-Tai
    Qing, Si-Han
    2003, Chinese Academy of Sciences (14):
  • [9] Linear slide attacks on the KeeLoq block cipher
    Bogdanov, Andrey
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 66 - 80
  • [10] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231