This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Differential Cryptanalysis of Tree-Structured Substitution-Permutation Networks
September 1995 (vol. 44 no. 9)
pp. 1150-1152

Abstract—We propose a differential attack on tree-structured substitution-permutation networks. The number of chosen plaintexts required for the differential attack to succeed is called the complexity. Our main result is to show that the expected complexity of the attack is linear in the size of the network. This is the first rigorous result concerning the complexity of a differential attack for a general class of product ciphers.

[1] C.M. Adams,“A formal and practical design procedure for Substitution-Permutation networkcryptosystem,” PhD thesis, Department of Electrical Engineering, Queen’s University atKingston, 1990.
[2] R.J. Anderson,“Tree functions and cipher systems,” Cryptologia, vol. XV, no. 3, pp. 194-202, 1991.
[3] F. Ayoub,“The design of complete encryption networks using cryptographically equivalentpermutations,” Computers and Security, vol. 2, pp. 261-267, 1982.
[4] E. Biham and A. Shamir,“Differential cryptanalysis of DES-like cryptosystems,” J. Cryptology, vol. 4, no. 1, pp. 3-72, 1991.
[5] H.M. Heys and S.E. Tavares,“Cryptanalysis of tree-structured substitution-permutationnetworks,” IEE Electronics Letters, vol. 29, no. 1, pp. 40-41, 1993.
[6] J.B. Kam and G.I. Davida,“A structured design of substitution-permutation encryptionnetworks,” IEEE Trans. Computers, vol. 28, no. 10, pp. 747-753, 1979.
[7] L.J. O’Connor,“On the distribution of characteristics in bijective mappings,” Advances in Cryptology, T. Helleseth ed., EUROCRYPT’93, Lecture notes in Computer Science, vol. 765, pp. 360-370, Springer-Verlag, 1994.

Index Terms:
Complete Boolean functions, cryptography, differential cryptanalysis, product cipher, substitution-permutation network.
Citation:
Luke O?Connor, "A Differential Cryptanalysis of Tree-Structured Substitution-Permutation Networks," IEEE Transactions on Computers, vol. 44, no. 9, pp. 1150-1152, Sept. 1995, doi:10.1109/12.464394
Usage of this product signifies your acceptance of the Terms of Use.