Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
J. Lee,
H. M. Heys () and
S. E. Tavares ()
Additional contact information
J. Lee: Queen’s University, Department of Electrical and Computer Engineering
H. M. Heys: Memorial University of Newfoundland, Faculty of Engineering and Applied Science
S. E. Tavares: Queen’s University, Department of Electrical and Computer Engineering
A chapter in Selected Areas in Cryptography, 1997, pp 55-70 from Springer
Abstract:
Abstract Linear cryptanalysis and differential cryptanalysis are two recently introduced, powerful methodologies for attacking private-key block ciphers. In this paper, we examine the application of these two cryptanalysis techniques to a CAST-like encryption algorithm. It is shown that, when randomly generated substitution boxes (s-boxes) are used in a CAST-like encryption algorithm, the resulting cipher is resistant to both the linear attack and the differential attack.
Keywords: private key ciphers; linear cryptanalysis; differential cryptanalysis; CAST; S-boxes (search for similar items in EconPapers)
Date: 1997
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4615-5489-9_5
Ordering information: This item can be ordered from
http://www.springer.com/9781461554899
DOI: 10.1007/978-1-4615-5489-9_5
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().