Differential Distribution Table implementation DDT survey

Main Article Content

Mohammed Eid Khamees Al-Shammary
Sufyan Salim Mahmood Al-Dabbagh

Abstract

The security of the transmitted data is one of the important issues that led to improve cryptosystems. Block ciphers as symmetric key cryptosystems are widely implemented in different applications and devices. Many algorithms had been presented that proposed new designs and enhancements for the block ciphers. Most of these papers based on the differential characteristics that provided by the Differential Distribution table DDT. The implementation of DDT had several points of advantages in design, modify and attack block cipher. Even with larger block size of some cipher families, the Partial Differential Distribution Table (PDDT) is implemented to override the big block size. The comparison results showed that both of DDT and PDDT are efficient tools that provide important differential characteristics that may implemented with accompanied of different function and deep learning models.


img7700.jpg


Article Details

How to Cite
Eid Khamees Al-Shammary, M., & Mahmood Al-Dabbagh, S. S. (2022). Differential Distribution Table implementation DDT survey. Technium: Romanian Journal of Applied Sciences and Technology, 4(10), 15–30. https://doi.org/10.47577/technium.v4i10.7700
Section
Articles

References

[ ] Jameel, Enas Ali, and Sameera Abbas Fadhel. "Digital Image Encryption Techniques: Article Review." Technium Vol. 4, Issue 2 pp.24-35 (2022).‏

[ ] Ezadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium Vol. 4, Issue 6 pp.18-28 (2022).‏

[ ] Wang, Fan, et al. "Resolution Adaptative Network for Cryptanalysis of Asymmetric Cryptosystems." IEEE Access 8 (2020): 187419-187430.‏

[ ] Lee, Ting Rong, et al. "Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes." IEEE Access 9 (2021): 134052-134064.‏

[ ] Zhu, Congxu, Guojun Wang, and Kehui Sun. "Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps." Entropy 20.11 (2018): 843.‏

[ ] Bagane, Pooja Anil, and Sirbi Kotrappa. "Bibliometric Survey for Cryptanalysis of Block Ciphers towards Cyber Security." Library Philosophy and Practice (2020): 1-18.‏

[ ] Guo, Hao, et al. "Differential attacks on CRAFT exploiting the involutory s-boxes and tweak additions." Cryptology ePrint Archive (2020).‏

[ ] Sehrawat, Deepti, and Nasib Singh Gill. "Lightweight block ciphers for IoT based applications: a review." International Journal of Applied Engineering Research 13.5 (2018): 2258-2270.‏

[ ] Dey, Sankhanil, and Ranjan Ghosh. "A review of existing 4-bit crypto S-Box cryptanalysis techniques and two new techniques with 4-bit boolean functions for cryptanalysis of 4-bit crypto S-Boxes." Advances in Pure Mathematics 8.03 (2018): 272.‏

[ ] Tentu, Appala Naidu. "A Review on Evolution of Symmetric Key Block Ciphers and Their Applications." IETE Journal of Education 61.1 (2020): 34-46.‏

[ ] Mariano, Artur. "LUSA: the HPC library for lattice-based cryptanalysis." Cryptology ePrint Archive (2020).‏

[ ] Coggia, Daniel. Techniques of cryptanalysis for symmetric-key primitives. Diss. Sorbonne Université, 2021.‏

[ ] Ankele, Ralph, and Stefan Kölbl. "Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis." International Conference on Selected Areas in Cryptography. Springer, Cham, 2018.‏

[ ] Liu, Yunwen. "Techniques for Block Cipher Cryptanalysis.", Dissertation doctoral, Arenberg Doctoral School,

Faculty of Engineering Science (2018).‏

[ ] Biryukov, Alex, et al. "Automated truncation of differential trails and trail clustering in ARX." International Conference on Selected Areas in Cryptography. Springer, Cham, 2022.‏

[ ] Liu, Ya, et al. "Improved impossible differential cryptanalysis of large-block Rijndael." Science China Information Sciences 62.3 (2019): 1-14.‏

[ ] Hutahaean, I. W., A. A. Lestari, and B. H. Susanti. "A tutorial of boomerang attack on SMALLPRESENT-[4]." Journal of Physics: Conference Series. Vol. 1836. No. 1. IOP Publishing, 2021.‏

[ ] Boura, Christina, and Anne Canteaut. "On the boomerang uniformity of cryptographic sboxes." IACR Transactions on Symmetric Cryptology (2018): 290-310.‏

[ ] Kousalya, R. "Security Analysis against Differential Cryptanalysis using Active S-Boxes." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12.13 (2021): 701-709.‏

[ ] Survanto, Yohan, and Muhammad Salman. "6 Round Improbable Differential Characteristic on M-PRESENT Using Undisturbed Bits." 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2019.‏

[ ] Dehnavi, S. (2018). Further Observations on SIMON and SPECK Block Cipher Families. Cryptography, 3(1), 1. doi:10.3390/cryptography3010001

[ ] Zhang, P., & Zhang, W. (2018). Differential cryptanalysis on block cipher skinny with MILP program. Security and Communication Networks, 2018.‏

[ ] Rodinko, M., & Oliynykov, R. (2018). An Approach to Search for Multi-Round Differential Characteristics of Cypress-256. 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). https://doi.org/10.1109/infocommst.2018.8631904

[ ] Dwivedi, A. D., & Srivastava, G. (2018). Differential cryptanalysis of round-reduced LEA. IEEE Access, 6, 79105-79113.‏

[ ] Dwivedi, A. D., Morawiecki, P., & Srivastava, G. (2019). Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access, 7, 16476-16486.‏

[ ] Cao, M., & Zhang, W. (2019). Related-key differential cryptanalysis of the reduced-round block cipher GIFT. IEEE Access, 7, 175769-175778.‏

[ ] Chatterjee, S., Nath Saha, H., Kar, A., Banerjee, A., Mukherjee, A., & Syamal, S. (2019). Generalised Differential Cryptanalysis Check for Block Ciphers. 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). doi:10.1109/iemcon.2019.8936149

[ ] Bar-On, A., Dunkelman, O., Keller, N., & Weizman, A. (2019, May). DLCT: a new tool for differential-linear cryptanalysis. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 313-342). Springer, Cham.‏

[ ] Ji, F., Zhang, W., Zhou, C., & Ding, T. (2020, October). Improved (related-key) differential cryptanalysis on GIFT. In International Conference on Selected Areas in Cryptography (pp. 198-228). Springer, Cham.‏

[ ] Bolel, O. (2021). Impossible and improbable differential cryptanalysis of Spook algorithm (Master's thesis, Middle East Technical University).‏

[ ] Kousalya, R. (2021). Security Analysis against Differential Cryptanalysis using Active S-Boxes. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(13), 701-709.‏

[ ] Pal, D., Mandal, U., Chaudhury, M., Das, A., & Chowdhury, D. R. (2022). A Deep Neural Differential Distinguisher for ARX based Block Cipher. Cryptology ePrint Archive.‏

[ ] Hu, K., Peyrin, T., & Wang, M. (2022). Finding All Impossible Differentials When Considering the DDT. Cryptology ePrint Archive.‏

[ ] Eddahmani, S., & Mesnager, S. (2022). Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes. Cryptography and Communications, 1-44.‏

[ ] Todo, Y., & Sasaki, Y. (2022). Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. In International Conference on Selected Areas in Cryptography (pp. 179-199). Springer, Cham.

[ ] Mahzoun, M., Kraleva, L., Posteuca, R., & Ashur, T. (2022). Differential Cryptanalysis of K-Cipher. Cryptology ePrint Archive.‏

[ ] Fan, T., Li, L., Wei, Y., & Pasalic, E. (2022). Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher. International Journal of Distributed Sensor Networks, 18(9), 15501329221119398.‏

[ ] Teh, J. S., & Biryukov, A. (2022). Differential cryptanalysis of WARP. Journal of Information Security and Applications, 70, 103316.‏

[ ] Teh, J. S., Tham, L. J., Jamil, N., & Yap, W. S. (2022). New differential cryptanalysis results for the lightweight block cipher BORON. Journal of Information Security and Applications, 66, 103129.‏

[ ] Zhang, K., Lai, X., Guan, J., & Hu, B. (2022). Research on the Security Level of µ 2 against Impossible Differential cryptanalysis. KSII Transactions on Internet and Information Systems (TIIS), 16(3), 972-985.‏