CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method

by Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 21
Year of Publication: 2013
Authors: Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A
10.5120/10593-5748

Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A . Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method. International Journal of Computer Applications. 63, 21 ( February 2013), 47-52. DOI=10.5120/10593-5748

@article{ 10.5120/10593-5748,
author = { Rajashekarappa, K M Sunjiv Soyjaudah, Sumitra Devi K A },
title = { Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 21 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 47-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number21/10593-5748/ },
doi = { 10.5120/10593-5748 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:00.608075+05:30
%A Rajashekarappa
%A K M Sunjiv Soyjaudah
%A Sumitra Devi K A
%T Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 21
%P 47-52
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper presents the Linear Cryptanalysis on S-DES and Symmetric Block Ciphers Using Hill Cipher Method. As a vehicle of demonstration of this concept, choose simple yet representative block ciphers such as computationally tractable versions of S-DES, for the studies. The attack presented in this paper is applicable to block structure independently of the key scheduling. The attack needs distinct known plaintexts which are a more realistic attack model in comparison with impossible differential cryptanalysis which uses chosen plaintext pairs. Moreover, linear cryptanalysis on simplified data encryption standard performed simulations on a small variant block and present the experimental results on the theoretical model of the multidimensional linear cryptanalysis using Hill Cipher method.

References
  1. Rajashekarappa, Dr K M Sunjiv Soyjaudah, 2012, ICIP, Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search Method, pp. 561-568, ©Springer-Verlag Berlin Heidelberg.
  2. Biham, E. , and Shamir, A, 1993, Differential Cryptanalysis of the Data Encryption Standard. NewYork: Springer-Verlag.
  3. Comppersmith, D, May, 1994, "The Data Encryption Standard (DES) and Its Strength Against Attacks", IBM Journal of Research and Development.
  4. Matsui, M,1993, "Linear Cryptanalysis Method for DES Cipher. " Proceedings, EUROCRYPT '93, published by Springer-Verlag.
  5. Barker, W, 1991,Introduction to the Analysis of the Data Encryption Standard (DES). Laguna Hills, CA: Aegean Park Press.
  6. Electronic Frontier Foundation, 1998, Cracking DES: Secrets of Encryption Research,Wiretap Politics, and Chip Design. Sebastopol, CA: O'Reilly.
  7. BibhudendraAcharya, GirijaSankarRath, Sarat Kumar Patra, Saroj Kumar Panigrahy, 2007, "Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm", International Journal of Security, Vol 1, Issue 1, pp. 14-21.
  8. William Stallings, 1989, "Cryptography and Network Security Principles and Practices", Fourth edition, McGraw- Hill, 2003. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science.
  9. Behrouz A. Forouzan, 2006, "Cryptography and Network Security", Firstedition, McGraw- Hill.
  10. Atul Kahate, 2003, "Cryptography and Network Security", TMH.
  11. Rajashekarappa and Dr. K M S Soyjaudah, 2012, "Heuristic Search Procedures for Cryptanalysis and Development of Enhanced Cryptographic Techniques" Published at International Journal of Modern Engineering Research (IJMER), Vol. 2, Issue. 3, pp-949-954.
  12. Poonam, G, 2009, "Crypatanalysis of SDES via Evolutionary Computation Techniques". International Journal of Computer Science and Information Security 1(1).
  13. Chanas, S. , Kobylanski, P, 1996, A New Heuristic Algorithm Solving the Linear Ordering Problem. Computational Optimization and Applications 6, 191–205.
  14. Ayman M. B. Albassal, Abdel-Moneim A. Wahdan, 2004, Genetic Algorithm Cryptanalysis of a Fiestel Type Block Cipher, International Conference on Electrical, Electronic and Computer Engineering, Egypt, PP. 217–221.
  15. Garg, P, 2010, Evolutionary Computation Algorithms for Cryptanalysis: A Study, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 7, No. 1.
  16. Coppersmith, D, 1994, "The Data Encryption Standard (DES) and Its Strength Against Attacks. " IBM Journal of Research and Development.
  17. Rajashekarappa, Dr K M Sunjiv Soyjaudah, 2012, Comparative Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search and Simulated Annealing Methods, International Journal of Engineering Research and Development, pp. 07-12.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Data Encryption Standard Linear Cryptanalysis