Avalanche Characteristics of Substitution-Permutation Encryption Networks

@article{Heys1995AvalancheCO,
  title={Avalanche Characteristics of Substitution-Permutation Encryption Networks},
  author={Howard M. Heys and Stafford E. Tavares},
  journal={IEEE Trans. Computers},
  year={1995},
  volume={44},
  pages={1131-1139}
}
This paperdevelopsanalyticalmodelsfor theavalanchecharacteristicsof a classof block ciphersusually referredto assubstitution-permutationencryptionnetworksor SPNs. An SPNis consideredto displaygoodavalanchecharacteristicsif a onebit changein the plaintext input is expectedto result in closeto half the ciphertextoutputbits changing.Goodavalanche characteristicsareimportantto ensurethata cipheris not susceptibleto statisticalattacksandthe strengthof anSPN… CONTINUE READING
Highly Cited
This paper has 62 citations. REVIEW CITATIONS

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
42 Extracted Citations
32 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.
Showing 1-10 of 42 extracted citations

63 Citations

0510'97'00'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 63 citations based on the available data.

See our FAQ for additional information.

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 32 references

Cryptography and computerprivacy

  • H. Feistel
  • Scientific American, vol. 228, no. 5, pp. 15–23…
  • 1973
Highly Influential
4 Excerpts

Tavares,“Substitution-permutationnetworksresistantto differential and linear cryptanalysis,”acceptedfor publicationin

  • S.E.H.M. Heys
  • Journalof Cryptology,
  • 1994
1 Excerpt

Wiener,“Efficient DESkey search,”tech.rep.,Schoolof ComputerScience,Carleton University, Ottawa,Canada,May 1994.Presentedat the RumpSessionof CRYPTO ’93

  • M J.
  • 1994
1 Excerpt

Shamir,“Dif ferential cryptanalysisof the full 16–roundDES,

  • E. Biham andA
  • Advances in Cryptology:Proceedingsof CRYPTO ’92,
  • 1993
1 Excerpt

A recursiveconstructionmethodof S-boxessatisfying strict avalanchecriterion,

  • K. Kim, T. Matsumoto, andH. Imai
  • Advancesin Cryptology:Proceedingsof CRYPTO
  • 1991
1 Excerpt

J.Massey,andS.Murphy, “Markov ciphersanddifferentialcryptanalysis,”Advances in Cryptology:Proceedingsof EUROCRYPT’91

  • X. Lai
  • 1991
1 Excerpt

Similar Papers

Loading similar papers…