Breaking block and product ciphers applied across byte boundaries

@article{Carlson2011BreakingBA,
  title={Breaking block and product ciphers applied across byte boundaries},
  author={Albert H. Carlson and Robert E. Hiromoto and Richard B. Wells},
  journal={Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems},
  year={2011},
  volume={2},
  pages={733-736}
}
The security of block and product ciphers is considered using a set theoretic estimation (STE) approach to decryption. Known-ciphertext attacks are studied using permutation (P) and substitution (S) keys. The blocks are formed form three (3) alphabetic characters (metacharacters) where the applications of P and S upon the ASCII byte representation of each of the three characters are allowed to cross byte boundaries. The application of STE forgoes the need to employ chosen-plaintext or known… CONTINUE READING

Figures, Tables, and Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

``On the Value of Information in System Identification - Bounded Noise Case,'

E. Fogal, Y. F. Huang
  • Automatica, v. 18,
  • 1982
VIEW 12 EXCERPTS
HIGHLY INFLUENTIAL

Using Set Theoretic Estimation to Implement Shannon Secrecy

  • 2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
  • 2005
VIEW 2 EXCERPTS

The Mathematics of Coding Theory

P. Garrett
  • 1st ed. Pearson/Prentice Hall, Upper Saddle River, NJ
  • 2004

Cryptography - theory and practice

  • Discrete mathematics and its applications series
  • 1995
VIEW 1 EXCERPT

A First Course in Probability

S. Ross
  • 1st ed. MacMillan Publishing, Inc., New York, NY
  • 1976
VIEW 2 EXCERPTS

Communication Theory of Secrecy Systems

C. E. Shannon
  • Bell Systems Technical Journal 28:
  • 1949
VIEW 2 EXCERPTS