Differential attack on mini-AES

Ajeng Gemellia, Asadini Dwi; Indarjani, Santi
May 2012
AIP Conference Proceedings;5/22/2012, Vol. 1450 Issue 1, p222
Academic Journal
This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison. Based on total propagation ratio and complexity resulted, Mini-AES algorithms are vulnerable to differential attack. The best differential characteristic is the differential characteristic using a single active s-box with the propagation ratio of 8 / 16.


Related Articles

  • Image enhancement using local intensity distribution equalization. Marukatat, Sanparith // EURASIP Journal on Image & Video Processing;9/5/2015, Vol. 2015 Issue 1, p1 

    This paper proposes a local intensity distribution equalization (LIDE) method for image enhancement. LIDE applies the idea of histogram equalization to parametric model in order to enhance an image using local information. It reduces the amount of computational resources required by traditional...

  • Improving Performance of Evolutionary Algorithms with Application to Fuzzy Control of Truck Backer-Upper System. Alipouri, Yousef; Ahmadizadeh, Saeed; Karimi, Hamid Reza; Naghavi, S. Vahid; Sarvestani, Ahad Soltani // Mathematical Problems in Engineering;2013, p1 

    We propose amethod to improve the performance of evolutionary algorithms (EA). The proposed approach defines operatorswhich can modify the performance of EA, including Levy distribution function as a strategy parameters adaptation, calculating mean point for finding proper region of breeding...

  • Less reality, more security. Ekert, Artur; Kay, Alastair; Pope, James // AIP Conference Proceedings;9/1/2012, Vol. 1469 Issue 1, p35 

    The concept of nonlocality, whereby a local operation on one state can instantaneously affect the properties of another spatially-separated state, has been investigated through the violation of Bell inequalities. Realisations of such violations in the laboratory paved the way for not only...

  • Structural and algorithmic properties for parametric minimum cuts. Granot, Frieda; McCormick, S.; Queyranne, Maurice; Tardella, Fabio // Mathematical Programming;Oct2012, Vol. 135 Issue 1/2, p337 

    We consider the minimum s, t-cut problem in a network with parametrized arc capacities. Following the seminal work of Gallo et al. (SIAM J. Comput. 18(1):30-55, ), classes of this parametric problem have been shown to enjoy the nice Structural Property that minimum cuts are nested, and the nice...

  • Improving security of the ping-pong protocol. Zawadzki, Piotr // Quantum Information Processing;Jan2013, Vol. 12 Issue 1, p149 

    A security layer for the asymptotically secure ping-pong protocol is proposed and analyzed in the paper. The operation of the improvement exploits inevitable errors introduced by the eavesdropping in the control and message modes. Its role is similar to the privacy amplification algorithms known...

  • The impact of the termination rule on cooperation in a prisoner's dilemma experiment. Normann, Hans-Theo; Wallace, Brian // International Journal of Game Theory;Aug2012, Vol. 41 Issue 3, p707 

    Cooperation in prisoner's dilemma games can usually be sustained only if the game has an infinite horizon. We analyze to what extent the theoretically crucial distinction of finite versus infinite-horizon games is reflected in the outcomes of a prisoner's dilemma experiment. We compare three...

  • Mutual Information Analysis: a Comprehensive Study. Batina, Lejla; Gierlichs, Benedikt; Prouff, Emmanuel; Rivain, Matthieu; Standaert, Fran├žois-Xavier; Veyrat-Charvillon, Nicolas // Journal of Cryptology;Spring2011, Vol. 24 Issue 2, p269 

    Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and knowledge of the target device by the adversary. In this paper, we compile recent contributions and applications of MIA...

  • Statistical Estimation of Parameters of Fractionally Stable Distributions*. Bening, V.; Korolev, V. // Journal of Mathematical Sciences;Mar2013, Vol. 189 Issue 6, p899 

    Estimators are constructed for the parameters of fractionally stable distributions.

  • To solving multiparameter problems of algebra. 8. The RP-q method and its applications. Kublanovskaya, V. // Journal of Mathematical Sciences;Mar2007, Vol. 141 Issue 6, p1654 

    A new method (the RP-q method) for factorizing scalar polynomials in q variables and q-parameter polynomial matrices (q = 1) of full rank is suggested. Applications of the algorithm to solving systems of nonlinear algebraic equations and some spectral problems for a q-parameter polynomial matrix...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics