How to distinguish between a block cipher and a random permutation by lowering the input entropy
A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced round...
Gespeichert in:
| Veröffentlicht in: | 2001 IEEE International Carnahan Conference on Secuity Technology S. 289 - 292 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Tagungsbericht |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
2001
|
| Schlagworte: | |
| ISBN: | 0780366360, 9780780366367 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced rounds versions of the block cipher TEA. |
|---|---|
| AbstractList | A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is explained. Additionally, we propose a genetic algorithm based implementation and show some preliminary results of these ideas on reduced rounds versions of the block cipher TEA. |
| Author | Hernandez, J.C. Gonzalez-Tablas, A. Sierra, J.M. Isasi, P. |
| Author_xml | – sequence: 1 givenname: J.C. surname: Hernandez fullname: Hernandez, J.C. organization: Comput. Sci. Dept., Carlos III Univ., Legands, Spain – sequence: 2 givenname: P. surname: Isasi fullname: Isasi, P. – sequence: 3 givenname: J.M. surname: Sierra fullname: Sierra, J.M. – sequence: 4 givenname: A. surname: Gonzalez-Tablas fullname: Gonzalez-Tablas, A. |
| BookMark | eNotkFFLwzAUhQMq6Obexaf7BzpvmzRNHqWoGwx8cD7PNL110S0paUbZv7cwDxw-OHDOw5mxax88MfaQ4zLPUT_V9cd2WSDmSy0LJaorNsNKIZeSS7xli2H4wUmiFKIs7tjXKoyQArRuSM5_n9ywh4bSSOTBQHMI9hes6_cUwfh2iuKEcISe4vGUTHLBQ3OGQxgpTn1IewLn-1MC8imG_nzPbjpzGGjxzzn7fH3Z1qts8_62rp83mctRpEw1yuqubawibSZLtFXFrWxRlqYg25EUjdLacqtbKpE6iUJwZWQnDRYdn7PHy64jol0f3dHE8-7yAf8DAe5V5w |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/CCST.2001.962847 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EndPage | 292 |
| ExternalDocumentID | 962847 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IH 6IK 6IL AAJGR AAVQY AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-i104t-8b8c9fdbc8e9a8e960c773c6d065a2ecfe64b899c3c9de50ef604438a6f6a02f3 |
| IEDL.DBID | RIE |
| ISBN | 0780366360 9780780366367 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000172166300041&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:16:12 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i104t-8b8c9fdbc8e9a8e960c773c6d065a2ecfe64b899c3c9de50ef604438a6f6a02f3 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_962847 |
| PublicationCentury | 2000 |
| PublicationDate | 20010000 |
| PublicationDateYYYYMMDD | 2001-01-01 |
| PublicationDate_xml | – year: 2001 text: 20010000 |
| PublicationDecade | 2000 |
| PublicationTitle | 2001 IEEE International Carnahan Conference on Secuity Technology |
| PublicationTitleAbbrev | CCST |
| PublicationYear | 2001 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000454452 |
| Score | 1.2886729 |
| Snippet | A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 289 |
| SubjectTerms | Artificial intelligence Computer science Computer security Cryptography Entropy Genetic algorithms Performance analysis Performance evaluation Testing |
| Title | How to distinguish between a block cipher and a random permutation by lowering the input entropy |
| URI | https://ieeexplore.ieee.org/document/962847 |
| WOSCitedRecordID | wos000172166300041&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9ueNDLdE6cX7yD127tmubjPBw7yBg4ZbeZ5kOL2o6tVfbfm7TdVPAiNNAGkpaUvJff-_g9hG44FhRjqjxGpO9hEWiPmYH2fK5wZMJQ6DLK9_GOTiZsPufTmme7zIXRWpfBZ7rnbktfvspk4UxlfU6cMG2gBqWkStXamVMckxyOKmDOrFR2NFg1v872mW69lD7vD4f3MwcOg14156_aKqVqGbX-9VFHqPOdogfTnfI5Rns6baPWtkYD1Fu2jQ5_EA6eoKdx9gl5Bsrt7PS5SNYvUEdqgYDYKrZXkIljGgCRKttlNZnK3mFp5XdROe0h3sCbK61mx4M9PUKS2leCMxJny00HPYxuZ8OxV9dY8BILxHKPxUxyo2LJNBe2EV9SGkqi7NFEDLQ0muDYYjIZSq505GtDfIxDJoghwh-Y8BQ10yzVZwgs2A0cvV5ohMQ0IjxW2BgVUDsWC0G6qO1Wb7GsaDQW1cKd_9l7gQ6qYC93XaJmvir0FdqXH3myXl2Xv_4LavqtjQ |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD7oFNSX6VS8mwdfu7VrmibPwzFxjoFT9jbTXLSo7dhaZf_epO2mgi9CA20gaQnNOTm37wO4YpiHGIfSoUS4DuaecqhuK8dlEgfa97kqsnwf--FgQMdjNqxwtotaGKVUkXymmva2iOXLVOTWVdZixArTddiwxFlVsdbKoWKx5HBQmubUyGULhFUh7Cyfw2Wc0mWtTud-ZM1Dr1nO-otdpVAu3fq_PmsXDr6L9NBwpX72YE0lDagvWRpQtWkbsPMDcnAfnnrpJ8pSJO3eTp7zeP6CqlwtxFFkVNsrErHFGkA8kabL6DKZvqOpkeB5GbZH0QK9WXI1Mx6Z8yOKE_NKZN3E6XRxAA_d61Gn51QsC05sTLHMoREVTMtIUMW4acQVYegLIs3hhLeV0IrgyFhlwhdMqsBVmrgY-5QTTbjb1v4h1JI0UUeAjLnrWYA9X3OBw4CwSGKtpReasZhzcgwNu3qTaQmkMSkX7uTP3kvY6o3u-pP-zeD2FLbL1C97nUEtm-XqHDbFRxbPZxfFb_AFpFew1g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2001+IEEE+International+Carnahan+Conference+on+Secuity+Technology&rft.atitle=How+to+distinguish+between+a+block+cipher+and+a+random+permutation+by+lowering+the+input+entropy&rft.au=Hernandez%2C+J.C.&rft.au=Isasi%2C+P.&rft.au=Sierra%2C+J.M.&rft.au=Gonzalez-Tablas%2C+A.&rft.date=2001-01-01&rft.pub=IEEE&rft.isbn=9780780366367&rft.spage=289&rft.epage=292&rft_id=info:doi/10.1109%2FCCST.2001.962847&rft.externalDocID=962847 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780366367/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780366367/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780366367/sc.gif&client=summon&freeimage=true |

