Skip to main content
title is fitted to questions.
Link
kelalaka
  • 50k
  • 12
  • 125
  • 214

How to avoid Improving differential cryptanalysis attacks?of a vulnerable cipher

Source Link
Tom
  • 1.3k
  • 8
  • 17

How to avoid differential cryptanalysis attacks?

How to avoid differential cryptanalysis attacks when you are inventing new cipher?

Let's say you have a $16$-round $128$-bit cipher vulnerable on differential cryptanalysis attacks. Now let's say you will add between every round:

  • bitwise NOT (optional you make it ot not - randomly),
  • xor with $128$-bit subkey,
  • moving bits by $0$ to $127$ places.

Now it looks like the attacker have to guess many variables first (we defined it by keys), to make differential cryptanalysis attack. Because he can do it easily only without this obstructing steps between rounds. Is it good idea to use it, if I would like to make cipher resistant on differential cryptanalysis?