# Breaking block and product ciphers applied across byte boundaries

@article{Carlson2011BreakingBA, title={Breaking block and product ciphers applied across byte boundaries}, author={Albert H. Carlson and Robert E. Hiromoto and Richard B. Wells}, journal={Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems}, year={2011}, volume={2}, pages={733-736} }

- Published in Proceedings of the 6th IEEE…2011
DOI:10.1109/idaacs.2011.6072867

The security of block and product ciphers is considered using a set theoretic estimation (STE) approach to decryption. Known-ciphertext attacks are studied using permutation (P) and substitution (S) keys. The blocks are formed form three (3) alphabetic characters (metacharacters) where the applications of P and S upon the ASCII byte representation of each of the three characters are allowed to cross byte boundaries. The application of STE forgoes the need to employ chosen-plaintext or known… CONTINUE READING

#### References

##### Publications referenced by this paper.

SHOWING 1-10 OF 10 REFERENCES

## ``On the Value of Information in System Identification - Bounded Noise Case,'

VIEW 12 EXCERPTS

HIGHLY INFLUENTIAL

## Using Set Theoretic Estimation to Implement Shannon Secrecy

VIEW 2 EXCERPTS

## The Mathematics of Coding Theory

## Applied Coding and Information Theory for Engineers

VIEW 2 EXCERPTS

## Cryptography - theory and practice

VIEW 1 EXCERPT

## The foundations of set theoretic estimation

VIEW 1 EXCERPT

## A First Course in Probability

VIEW 2 EXCERPTS

## Communication Theory of Secrecy Systems

VIEW 2 EXCERPTS