Loading...

A new approach to key schedule designing

Hoseini Najarkolaei, S. R ; Sharif University of Technology

533 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2017.8488373
  3. Abstract:
  4. Diffusion of key schedule algorithm plays an important role in security of block ciphers. In this paper, we present a new approach to key schedule diffusion analysis by taking the advantages of graph theory modeling. This modeling can help to disclose the weaknesses of key schedules. In this line, the key schedule weaknesses of Twine-128 are shown and an improved key schedule is proposed. In order to make a fair comparison, some parameters are introduced to quantify the diffusion property of key schedule, and compare the results for Twine-128 with both key schedules. The results show that the new key schedule made Twine-128 stronger. Also for more reliability, the results of biclique attack on Twine-128 with both key schedules are compared and the significances of the new one are illustrated. © 2017 IEEE
  5. Keywords:
  6. Block cipher ; Key schedule ; Permutation graph ; Chromium compounds ; Cryptography ; Diffusion ; Graph theory ; Security of data ; Twine ; Biclique ; Block ciphers ; Diffusion analysis ; Diffusion properties ; Graph theory models ; New approaches ; Permutation graph ; Schedule algorithms ; Scheduling algorithms
  7. Source: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 64-69 ; 9781538665602 (ISBN)
  8. URL: https://ieeexplore.ieee.org/document/8488373