Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher

The antigen-antibody interaction, somatic hyper mutation and protein structural features in immune systems have been selected as inspired approach in designing the new block cipher algorithm called 3D-AES. However, these computation elements from immune systems have not proved yet whether it can be...

Full description

Bibliographic Details
Published in:2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2016
Main Author: Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2016
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-84997615803&doi=10.1109%2fFSKD.2016.7603290&partnerID=40&md5=9eea735649e37f23e782fc2e52c9a40d
id 2-s2.0-84997615803
spelling 2-s2.0-84997615803
Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
2016
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2016


10.1109/FSKD.2016.7603290
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84997615803&doi=10.1109%2fFSKD.2016.7603290&partnerID=40&md5=9eea735649e37f23e782fc2e52c9a40d
The antigen-antibody interaction, somatic hyper mutation and protein structural features in immune systems have been selected as inspired approach in designing the new block cipher algorithm called 3D-AES. However, these computation elements from immune systems have not proved yet whether it can be successfully applied and satisfies with Shannon's diffusion property in designing a new block cipher algorithm. This paper introduces two different types of attacks on the proposed block cipher. This paper measures and analyses the diffusion property of the block cipher by square attack and boomerang attack. It also discussed the best possible diffusion and described how it is relevant for chosen plaintext attack and conventional non related-key attacks based on the experiment done in the contact of the wide trail strategy family. © 2016 IEEE.
Institute of Electrical and Electronics Engineers Inc.

English
Conference paper

author Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
spellingShingle Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
author_facet Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
author_sort Ariffin S.; Hisan N.A.M.; Arshad S.; Bakar S.H.S.A.
title Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
title_short Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
title_full Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
title_fullStr Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
title_full_unstemmed Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
title_sort Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
publishDate 2016
container_title 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2016
container_volume
container_issue
doi_str_mv 10.1109/FSKD.2016.7603290
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-84997615803&doi=10.1109%2fFSKD.2016.7603290&partnerID=40&md5=9eea735649e37f23e782fc2e52c9a40d
description The antigen-antibody interaction, somatic hyper mutation and protein structural features in immune systems have been selected as inspired approach in designing the new block cipher algorithm called 3D-AES. However, these computation elements from immune systems have not proved yet whether it can be successfully applied and satisfies with Shannon's diffusion property in designing a new block cipher algorithm. This paper introduces two different types of attacks on the proposed block cipher. This paper measures and analyses the diffusion property of the block cipher by square attack and boomerang attack. It also discussed the best possible diffusion and described how it is relevant for chosen plaintext attack and conventional non related-key attacks based on the experiment done in the contact of the wide trail strategy family. © 2016 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn
language English
format Conference paper
accesstype
record_format scopus
collection Scopus
_version_ 1809677606989070336