Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Menoufia Journal of ...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Menoufia Journal of Electronic Engineering Research
Article . 2019 . Peer-reviewed
Data sources: Crossref
https://dx.doi.org/10.60692/av...
Other literature type . 2019
Data sources: Datacite
https://dx.doi.org/10.60692/0h...
Other literature type . 2019
Data sources: Datacite
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Immunity of Lightweight DES Algorithm (DESL) Against Linear Cryptanalysis Attack

مناعة خوارزمية DESL خفيفة الوزن (DESL) ضد هجوم تحليل التشفير الخطي
Authors: Bassam Aboshsha; Mohamed M. Dessouky; Rabie A. Ramadan; Ayman El‐Sayed;

Immunity of Lightweight DES Algorithm (DESL) Against Linear Cryptanalysis Attack

Abstract

Lightweight DES Algorithm (DESL) a été présenté par Axel Poschmann et.al comme un algorithme de cryptage fort, compact et efficace adapté aux ressources de contrainte telles que les WSN, les dispositifs RFID et IOT. Cet article traite de la sécurité du DESL contre la cryptanalyse linéaire qui est une attaque en texte clair connue dans laquelle un grand nombre de paires texte clair-cryptage sont utilisées pour déterminer la valeur des bits clés. La cryptanalyse linéaire fonctionne sur le principe de trouver « des occurrences à forte probabilité d'expressions linéaires impliquant des bits de texte en clair, des bits de texte chiffré et des bits de sous-clé ». De plus, nous montrons que le DESL est plus résistant contre l'attaque de cryptanalyse linéaire que le DES classique.

El algoritmo DES ligero (DESL) fue introducido por Axel Poschmann et.al como un algoritmo de cifrado fuerte, compacto y eficiente adecuado para recursos de restricción como WSN, RFID y dispositivos IOT. Este documento analiza la seguridad del DESL contra el Criptoanálisis Lineal, que es un ataque conocido de texto plano en el que se utiliza un gran número de pares de texto plano-texto cifrado para determinar el valor de los bits de clave. El criptoanálisis lineal funciona según el principio de encontrar "ocurrencias de alta probabilidad de expresiones lineales que involucran bits de texto plano, bits de texto cifrado y bits de subclave". Además, mostramos que el DESL es más resistente contra el ataque de criptoanálisis lineal que el DES clásico.

Lightweight DES Algorithm (DESL) was introduced by Axel Poschmann et.al as a strong, compact and efficient encryption algorithm suitable for constraint resource like WSNs, RFID and IOT devices. This paper discusses the security of the DESL against Linear Cryptanalysis which is a known plaintext attack in which a large number of plaintext-ciphertext pairs are used to determine the value of key bits. Linear cryptanalysis works on the principle of finding "high probability occurrences of linear expressions involving plaintext bits, ciphertext bits, and subkey bits". Furthermore, we show that DESL is more resistant against the linear cryptanalysis attack than classical DES.

تم تقديم خوارزمية DESL خفيفة الوزن (DESL) بواسطة Axel Poschmann et.al كخوارزمية تشفير قوية ومدمجة وفعالة مناسبة لموارد القيود مثل WSNs و RFID وأجهزة إنترنت الأشياء. تناقش هذه الورقة أمان DESL ضد تحليل التشفير الخطي وهو هجوم نصي عادي معروف يستخدم فيه عدد كبير من أزواج النص العادي والنص المشفر لتحديد قيمة البتات الرئيسية. يعمل تحليل التشفير الخطي على مبدأ العثور على "التكرارات عالية الاحتمال للتعبيرات الخطية التي تتضمن وحدات بت النص العادي ووحدات بت النص المشفر ووحدات بت المفتاح الفرعي". علاوة على ذلك، نظهر أن DESL أكثر مقاومة ضد هجوم تحليل التشفير الخطي من DES الكلاسيكي.

Keywords

Ciphertext, Encryption, Lightweight Ciphers, Optical Code Division Multiple Access, Cryptanalysis, Cryptanalysis of Block Ciphers and Hash Functions, Engineering, Theoretical computer science, Artificial Intelligence, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Electrical and Electronic Engineering, Linear cryptanalysis, Cryptography and Error-Correcting Codes, Symmetric-key algorithm, Public-key cryptography, Plaintext, Computer science, Algorithm, Decoding Algorithms, Computer Science, Physical Sciences, Cryptography, Security Analysis, Mathematics

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
1
Average
Average
Average
gold
Related to Research communities