Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Blok şifrelerin olası olmayan diferansiyel kriptanalizi
Download
TVRNME56UTA.pdf
Date
2013
Author
Taşkın, Kemal Halil
Doğanaksoy, Ali
Tezcan, Cihangir
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
143
views
271
downloads
Cite This
URI
https://app.trdizin.gov.tr/publication/project/detail/TVRNME56UTA
https://hdl.handle.net/11511/50180
Collections
Graduate School of Applied Mathematics, Project and Design
Suggestions
OpenMETU
Core
Related-key attacks on block ciphers
Darbuka, Aslı; Doğanaksoy, Ali; Department of Cryptography (2009)
One of the most important cryptographic primitives is the concept of block ciphers which yields confidentiality for data transmission in communication. Therefore, to be sure that confidentiality is provided, it is necessary to analyse the security of block ciphers by investigating their resistance to existing attacks. For this reason, related-key attacks gain much popularity in recent years and have been applied to many block ciphers with weak key schedules. In this work, our main motivation is to cover typ...
Basic cryptanalysis methods on block ciphers
Çelik, Dilek; Doğanaksoy, Ali; Department of Cryptography (2010)
Differential cryptanalysis and linear cryptanalysis are the first significant methods used to attack on block ciphers. These concepts compose the keystones for most of the attacks in recent years. Also, while designing a cipher, these attacks should be taken into consideration and the cipher should be created as secure against them. Although di fferential cryptanalysis and linear cryptanalysis are still important, they started to be ine cient due to the improvements in the technology. So, these attacks are ...
Combined attacks on block ciphers
Öztop, Neşe; Doğanaksoy, Ali; Department of Cryptography (2009)
Cryptanalytic methods are very important tools in terms of evaluating the security of block ciphers in a more accurate and reliable way. Differential and linear attacks have been the most effective cryptanalysis methods since the early 1990s. However, as the technology developed and more secure ciphers are designed, these fundamental methods started to be not so efficient. In order to analyze the ciphers, new methods should be introduced. One approach is inventing new techniques that are different from the ...
Analysis of three block cipher based hash functions : Whirpool, Grøstl and Grindahl
Ismailova, Rita; Diker Yücel, Melek; Department of Cryptography (2012)
The subject of this thesis is the study of cryptographic hash functions, which utilize block ciphers as underlying chain functions. It is mainly concerned with the analysis of the three hash algorithms, the Whirlpool, Grøstl and Grindahl. All these hash functions have underlying block ciphers that are modified versions of the Advance Encryption Standard and we investigate the behavior of these block ciphers under the integral attack. Statistical tests, such as the avalanche test and the collision test, are ...
Possibilistic interpretation of mistuning in bladed disks by fuzzy algebra
Karataş, Hamit Çağlar; Özgüven, Hasan Nevzat; Ciğeroğlu, Ender; Department of Mechanical Engineering (2012)
This study aims to define the possibilistic interpretation of mistuning and examine the way of determining the worst case situations and assessing reliability value to that case by using possibilistic methods. Furthermore, in this study, benefits of using possibilistic interpretation of mistuning in comparison to probabilistic interpretation of mistuning are investigated. For the possibilistic analysis of mistuned structures, uncertain mistuning parameters are modeled as fuzzy variables possessing possibili...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
K. H. Taşkın, A. Doğanaksoy, and C. Tezcan, “Blok şifrelerin olası olmayan diferansiyel kriptanalizi,” 2013. Accessed: 00, 2020. [Online]. Available: https://app.trdizin.gov.tr/publication/project/detail/TVRNME56UTA.