ON THE CRYPTANALYSIS OF ROTOR MACHINES AND SUBSTITUTION PERMUTATION NETWORKS

被引:2
|
作者
ANDELMAN, D [1 ]
REEDS, J [1 ]
机构
[1] LINKABIT CORP, SAN DIEGO, CA 92121 USA
关键词
D O I
10.1109/TIT.1982.1056523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:578 / 584
页数:7
相关论文
共 50 条
  • [31] Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
    Ahmad, Musheer
    Ahmad, Faiyaz
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 481 - 488
  • [32] Designing permutation-substitution image encryption networks with Henon map
    Ping, Ping
    Xu, Feng
    Mao, Yingchi
    Wang, Zhijian
    NEUROCOMPUTING, 2018, 283 : 53 - 63
  • [33] Inefficiency of variant characteristics for substitution-permutation networks with position permutations
    Sadowski, A
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 171 - 182
  • [34] Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks
    Lewandowski, Matthew
    Katkoori, Srinivas
    2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 350 - 355
  • [35] Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
    Cogliati, Benoit
    Dodis, Yevgeniy
    Katz, Jonathan
    Lee, Jooyoung
    Steinberger, John
    Thiruvengadam, Aishwarya
    Zhang, Zhe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 722 - 753
  • [36] Efficient Cryptanalysis of Homophonic Substitution Ciphers
    Dhavare, Amrapali
    Low, Richard M.
    Stamp, Mark
    CRYPTOLOGIA, 2013, 37 (03) : 250 - 281
  • [37] Linear cryptanalysis of PRESENT-like ciphers with secret permutation
    Liu, Guo-Qiang
    Jin, Chen-Hui
    Computer Journal, 2016, 59 (04): : 549 - 558
  • [38] Cryptanalysis and improvement of the image cryptosystem reusing permutation matrix dynamically
    Diab, Hossam
    El-semary, Aly M.
    SIGNAL PROCESSING, 2018, 148 : 172 - 192
  • [39] Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation
    Liu, Guo-Qiang
    Jin, Chen-Hui
    COMPUTER JOURNAL, 2016, 59 (04): : 549 - 558
  • [40] Cryptanalysis of Boolean permutation-based key escrow scheme
    Youssef, Amr M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (01) : 56 - 60