Some results on cryptanalysis of SMS4 block cipher (Q5962412): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Set OpenAlex properties.
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q122586977 / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1504/ijact.2010.033799 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1963841510 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 10:12, 30 July 2024

scientific article; zbMATH DE number 5789974
Language Label Description Also known as
English
Some results on cryptanalysis of SMS4 block cipher
scientific article; zbMATH DE number 5789974

    Statements

    Some results on cryptanalysis of SMS4 block cipher (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    22 September 2010
    0 references
    Summary: SMS4 is a 128-bit block cipher used in the WAPI standard in wireless networks in China. The cipher has attracted much attention in the past several years. This paper consists of two parts. The first part is on the design of the linear diffusion layer \(L\) of SMS4. Some observations on \(L\) are present, which open out the design rationales of \(L\) and such class functions to a great extent. The second part is on the differential attack against SMS4. An effective 19-round differential characteristic is presented. Then, a simple differential attack on 23-round SMS4 is given, which is the best known attack on SMS4 so far.
    0 references
    WAPI
    0 references
    block ciphers
    0 references
    SMS4
    0 references
    diffusion transformation
    0 references
    differential cryptanalysis
    0 references
    China
    0 references
    wireless networks
    0 references
    cryptography
    0 references
    information security
    0 references
    differential attacks
    0 references

    Identifiers