Enter your keyword

2-s2.0-70449652337

[vc_empty_space][vc_empty_space]

On applicability of chaos game method for block cipher randomness analysis

Sulistyo B.a, Rahardjo B.a, Mahayana D.a

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]Block cipher can be considered as a random permutation function which maps a set of plaintext character P to a set of ciphertext character C. Block cipher is designed in a way that the effort to distinguish it from a random permutation function will be very difficult or computationally infeasible. It this paper, block cipher randomness analysis is performed by using chaos game method. The method treats block cipher as a mapping function of a discrete time dynamical system. The system is used to generate a random sequence. Next, chaos game method analyzes the sequesnce in order to reveal its characteristics or regularities. The applicability of the method to reveal some characteristics of a block cipher is verified by using it for comparing the randomness of three-round and four-round SPN-network and distinguishing them from each other. So, the method can role as a distinguisher. © 2009 IEEE.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Block ciphers,Distinguishers,Mapping functions,Random permutation function,Random permutations[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Block cipher,Distinguisher,Mapping function,Random permutation function,Randomness analysis[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICEEI.2009.5254777[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]