抄録
In this paper, we give a theoretical analysis of η2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against η2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against η2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against η2 attack is shown.
本文言語 | English |
---|---|
ページ(範囲) | 142-153 |
ページ数 | 12 |
ジャーナル | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
巻 | 2727 LNCS |
DOI | |
出版ステータス | Published - 2003 |
外部発表 | はい |
イベント | 8th Australasian Conference on Information Security and Privacy, ACISP 2003 - Wollongong, NSW, Australia 継続期間: 2003 7月 9 → 2003 7月 11 |
ASJC Scopus subject areas
- 理論的コンピュータサイエンス
- コンピュータ サイエンス(全般)