Blok şifrelerin olası olmayan diferansiyel kriptanalizi

Taşkın, Kemal Halil
Doğanaksoy, Ali
Tezcan, Cihangir


Related-key attacks on block ciphers
Darbuka, Aslı; Doğanaksoy, Ali; Department of Cryptography (2009)
One of the most important cryptographic primitives is the concept of block ciphers which yields confidentiality for data transmission in communication. Therefore, to be sure that confidentiality is provided, it is necessary to analyse the security of block ciphers by investigating their resistance to existing attacks. For this reason, related-key attacks gain much popularity in recent years and have been applied to many block ciphers with weak key schedules. In this work, our main motivation is to cover typ...
Basic cryptanalysis methods on block ciphers
Çelik, Dilek; Doğanaksoy, Ali; Department of Cryptography (2010)
Differential cryptanalysis and linear cryptanalysis are the first significant methods used to attack on block ciphers. These concepts compose the keystones for most of the attacks in recent years. Also, while designing a cipher, these attacks should be taken into consideration and the cipher should be created as secure against them. Although di fferential cryptanalysis and linear cryptanalysis are still important, they started to be ine cient due to the improvements in the technology. So, these attacks are ...
Combined attacks on block ciphers
Öztop, Neşe; Doğanaksoy, Ali; Department of Cryptography (2009)
Cryptanalytic methods are very important tools in terms of evaluating the security of block ciphers in a more accurate and reliable way. Differential and linear attacks have been the most effective cryptanalysis methods since the early 1990s. However, as the technology developed and more secure ciphers are designed, these fundamental methods started to be not so efficient. In order to analyze the ciphers, new methods should be introduced. One approach is inventing new techniques that are different from the ...
Analysis of three block cipher based hash functions : Whirpool, Grøstl and Grindahl
Ismailova, Rita; Diker Yücel, Melek; Department of Cryptography (2012)
The subject of this thesis is the study of cryptographic hash functions, which utilize block ciphers as underlying chain functions. It is mainly concerned with the analysis of the three hash algorithms, the Whirlpool, Grøstl and Grindahl. All these hash functions have underlying block ciphers that are modified versions of the Advance Encryption Standard and we investigate the behavior of these block ciphers under the integral attack. Statistical tests, such as the avalanche test and the collision test, are ...
Possibilistic interpretation of mistuning in bladed disks by fuzzy algebra
Karataş, Hamit Çağlar; Özgüven, Hasan Nevzat; Ciğeroğlu, Ender; Department of Mechanical Engineering (2012)
This study aims to define the possibilistic interpretation of mistuning and examine the way of determining the worst case situations and assessing reliability value to that case by using possibilistic methods. Furthermore, in this study, benefits of using possibilistic interpretation of mistuning in comparison to probabilistic interpretation of mistuning are investigated. For the possibilistic analysis of mistuned structures, uncertain mistuning parameters are modeled as fuzzy variables possessing possibili...
Citation Formats
K. H. Taşkın, A. Doğanaksoy, and C. Tezcan, “Blok şifrelerin olası olmayan diferansiyel kriptanalizi,” 2013. Accessed: 00, 2020. [Online]. Available: