171 Pages
English
Gain access to the library to view online
Learn more

High speed cryptography for network and disk encryption applications [Elektronische Ressource] / Mohamed Abo El-Fotouh

Gain access to the library to view online
Learn more
171 Pages
English

Informations

Published by
Published 01 January 2009
Reads 10
Language English
Document size 1 MB

Exrait

K.
genehmigten
F
16.06.2009
22.10.2009
ollständiger
Prüfer
Cryptograph
k
w
Univ
Elektrotec
o
hen
d
Univ.-Prof.
der
sertation:
v
Univ.-Prof.
hnik
I
eitung
T
and
hen
die
Mohamed
stec
Diep
ak
otouh
eines
für
V
druc
G.
Sp
Di
on
Univ.-Prof.
ersität
old
für
C.
for
Die
Net
wurde
Münc
ei
ork
hnisc
Univ.-Prof.
Mün-
Disk
ingeric
durc
Applications
akultät
K.
und
Ab
a
Lehrstuhl
des
El-F
ademisc
ol
Grades
V
Doktor-Ingenieurs
Univ
Dissertation.
Ab
orsitzender:
High
Dr.-Ing.habil.
k
Rigoll
Daten
der
v
s
eed
1.
der
Dr.-Ing.
hnisc
Diep
akultät
2.
y
Dr.rer.nat.
Elektrotec
Ec
erarb
ert
und
Dissertation
am
ec
he
hen
Dr.-Ing.
Encryption
tet
nf
b
o
der
r
ec
m
hen
ation-
ersität
stec
c
hnik
e
der
h
T
und
ec
h
hnisc
F
hen
für
Univ
hnik
ersität
Information-
Münc
hnik
hen
m
zur
angenommen.
Erlangung
Te
thankful
all,
for
paren
p
w
(Deutsc
y
al
an
of
to
otouh
m
e
tributed
I
at
urthermore
Klaus
e
sc
problems
the
and
o
the
though
This
Germany
orate
times.
Pro
Cl
v
in
as
m
complishmen
AAD
een
the
y
ply
her
V
his
he
s
eriences
guidance,
ed.
.
m
t
The
i
ork.
e
hen
.
ortunit
oted
for
er-ending
and
o
as
at
sev
am
has
Prof.
who
Ec
sta
for
co
she
(LD
to
its
w
D
appreciate
First
ha
ted
ted
am
holarship.
Ak
am
to
to
ec
at
old
ha
h
vided
care,
vironmen
out
their
advices,
out
holde
v
pro
I
he
to
t
fam
this
y
es
t
from
this
a
I
He
had
ul
Institute
and
opp
sp
(TUM).
is
y
m
thesis
for
meet
ort.
w
A
collab
l
Data
2009
with
all
during
I
eral
deeply
presen
to
ersons
Dr.
y
audia
ha
k
cessing
rt
e
the
y
terest
n
sho
b
ed
to
co-advise
a
y
ac
ork.
V)
deeply
t.
D
AAD
who
of
v
researc
gran
I
me
her
sc
deepl
F
T
I
thankful
dee
ademisc
thankful
Prof.Dr.-Ing.
m
carried
colleagues
Diep
LD
Austausc
that
for
v
hni
pro
great
t
Dienst)
en
v
t
in
sharing
uable
exp
holarship
ab
helpful
the
c
in
and
olv
r
Finally
viding
w
at
t
dieren
thank
Throughout
y
facili
ily
Univ
m
i
friends.
p
encouragemen
to
and
ort
out
them
d,
s
w
p
Münc
w
rf
The
h
this
the
ersität
erio
carry
supp
w
source
as
inspiration
alw
energy
a
A
ys
ecial
a
t
frequen
dev
t
to
source
y
of
ts
supp
nev
ort
supp
and
Munich,
guidance
Mohamed
in
b
all
E
asp
-F
e
June
cts
.
and
Prefaceplain
osed.
encrypted.
k
of
and
k
encryption
e
y
m
serv
share
curren
attac
and
are
whic
,
attac
a
u
hemes
de
t
hemes
b
and
op
is
of
the
blo
i
secure
k
increases
ks
,
t
hosen
s
hosen
k
o
dev
the
eha
hosen
In
the
texts
w
dedicated
elop
the
the
memory
these
n
e
applications,
these
and
used
are
whic
u
with
ey
in
r
applications
sc
ey
coun
r
attac
the
of
eld
attac
ho
cryptanalysis
AES.
v
wil
hosen
,
hosen
y
hosen
used
new
c
6-round
dels
the
c
dge,
w
amoun
other
the
The
AES.
o
prop
des
sce-
primary
hemes
ld
op
t
w
applications.
highe
w
F
h
e
increases
e
n
are
a
sc
disk
y
encryption
prop
elop
mo
curren
eed
a
main
These
ted
a
is
in
demonstrate
secure
k
hedule
general
k
a
is
cryptograph
k
secondary
uses
These
in
The
mo
In
related-k
together
It
lized
complexit
k
exhaustiv
p
searc
to
A
applied
ideas
the
prop
cryptograph
can
x
some
prop
text,
b
c
thesis,
e
main
and
dels
e
the
n
encryption
Using
is
attac
design
5-
the
a
n
ted;
the
est
new
kno
cipher
attac
prop
the
es,
of
encryption
text
ords
to
and
and
t
o
new
of
tical
encryption

in
the
new
op
encryption
ey
disk
dv
des
o
are
disk
These
k
encryption
cryptanalysis,
w
is
throughput
new
t
dieren
these
m
guideli
w
a
whic
to
n
e
of
dels
urr
o
clien
presen
er
(AES)
F
p
ry
All
eral
com
des
for
are
dels
with
AES
of
dels
mo
in
e
a
i
presen
v
idea,
mo
to
eration
h
thr
together
h
splitting
disks
secure
solutions.
encryption
k
new
sc
ey
for
these
c
to
ciphe
ized
s
primary
prop
s
This
a
ey
ks.
hedule
k
a
deas.
cipher
.
the
gene
ter
secondary
de,
are
eliminates
ey
ey
a
ks.
with
also
the
the
primary
y
attac
the
ey
e
y
ey
used
h
are
k.
determine
dditionally
of
new
w
in
on
are
plain
osed,
re
h
e
impro
The
e
t
c
y
plain-
l
c
osed
ciphertext,
e
hosen
th
text-adaptiv
The
c
mo
ciphertext
functionalit
c
new
ciphertext-adaptiv
of
c
are
plai
secondary
text
e
ks.
ey
these
to
ideas,
to
ks
mo
n
hange
and
and
AES
w
r
cryptanalysis
moun
y
to
elop
b
blo
of
are
author's
k
wle
net
these
b
ks
ted.
se
v
least
ork
t
in
c
osed.
plain
w
in
sc
literature
b
attac
new
5-
encrypting
6-round
and
T
w
demonstrate
the
usage
iden
the
mo
osed
plain
mo
A
ls
with
realistic
of
narios,
same
net
e
ork
k
sc
eration
and
but
encryption
designing
o
w
of
to
eration
dieren
dev
of
ed.
secondary
net
encryption
ork
eys,
sc
anced
allo
result
a
Three
r
t
than
a
curren
o
solutions.
encryption
urthermore,
t
sc
require
The
uc
dels
lo
n
er
k
,
s
h
r
the
use
um
Standard
er
mo
co
prop
c
securely
e
y
t
also
ts
s
serv
ted
can
sp
e.
the
or
d.
enc
ossibilit
ption
hedule
sev
to
new
the
mo
bine
of
is
eration
mo
dev
osed
ed
some
In
i
ideas
high
Encryption
secure
mo
ciphertexts.
hemes
eac
the
h
t
other
des
is
op
discussed.
r
In
t
order
on
to
impro
increase
ed.
the
new
securit
des
y
op
of
oer
the
higher
prop
o
osed
g
encryption
put
mo
accessing
dels,
than
a
t
gen-
iii
eralized
Abstractiv.
.
.
.
Bo
7
.
.
.
.
.
.
.
k
.
.
8
.
.
.
.
.
.
S
.
.
.
5
.
.
.
Encryption
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3.3.1
.
.
.
.
.
.
.
.
2.2.1
15
.
.
Cryptanalysis
.
ossible
.
.
.
.
.
.
Thesis
.
.
18
1.2
.
.
P
.
.
.
A
.
.
.
Pushdo
anced
.
.
A
.
.
.
ttac
.
.
AES
on
ations
.
.
.
.
25
erations
.
.
.
.
.
.
.
.
ks
.
.
.
.
Con
.
.
Key
.
.
.
.
tial
.
.
.
.
.
.
.
.
.
.
.
k
.
.
.
.
The
3.1.5
w
.
.
.
.
.
.
ttac
.
.
.
.
.
.
.
.
.
.
.
.
.
21
.
.
.
.
.
.
2
.
.
k
.
.
.
.
5
21
2.4.2
.
t
.
.
.
.
3.2.3
.
.
1.2.2
.
.
.
.
wn
.
.
.
.
.
.
.
.
.
.
.
.
Mo
.
2.2
.
.
.
.
wn-Square-5*
.
.
.
.
.
3.3.4
.
.
.
.
.
.
.
the
.
.
.
.
1.3
.
.
.
.
.
Ciphers
.
.
Exhaustiv
.
h
.
.
.
.
.
.
.
.
3.1.2
.
Li
.
.
.
.
.
.
Symmetric
3.1.3
.
tials
.
.
.
.
.
.
.
.
.
17
.
A
.
.
.
.
.
.
1.2.1
.
6
.
3
.
dv
A
.
.
Pro
.
.
.
.
.
Applications
.
.
.
.
Square
.
.
Problem
.
AES
.
.
.
.
.
.
.
.
18
.
Sums
.
.
ation
.
.
.
.
.
.
.
.
.
.
Prop
.
ks
.
.
.
.
AES
.
.
.
.
.
.
.
.
21
A
A
.
.
.
.
.
.
Standard
.
.
.
.
.
.
Push
Basic
k
Decryption
.
tro
.
.
.
.
.
.
.
.
.
.
h
.
.
.
.
.
.
.
.
.
.
11
.
Encryption
3.3
Sc
ttac
.
.
.
.
.
.
.
.
.
.
.
.
.
wn-Square-5
.
.
.
.
.
.
.
.
13
.
.
Pushdo
of
.
.
.
.
.
Algorithms
.
.
.
.
3.3.3
.
.
.
.
.
.
.
.
.
.
.
.
.
wn-P
.
s
.
.
.
.
.
.
.
.
.
27
.
on
.
Cipher
.
.
.
.
2
.
.
.
.
.
.
.
Original
.
5
.
.
.
Asymmetric
.
tributions
.
.
.
.
3.1.1
.
e
.
Searc
.
A
k
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15
.
Dieren
.
and
.
near
.
.
.
.
.
.
.
.
.
.
2.2.2
.
.
17
Ciphers
Imp
.
Dieren
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3.1.4
1.1
omerang
.
ttac
.
.
.
.
1
.
.
.
.
.
.
.
.
.
.
.
.
.
2.3
.
Net
.
A
18
1.4
Collision
anced
ttac
.
.
Standard
.
Organization
.
cess
.
ork
.
.
.
.
.
.
.
1
.
.
.
.
.
.
.
.
3.1.6
.
A
.
k
.
.
In
.
2.4
.
.
.
Algorithm
.
.
.
.
.
.
.
.
.
Motiv
.
.
.
.
.
.
3.1.7
.
artial
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3.2
.
osed
.
ttac
.
.
.
.
.
.
Statemen
.
2.4.1
.
.
.
Encryption
.
.
.
.
.
3
.
.
.
.
.
.
.
The
.
.
3.2.1
.
wn
.
ttac
dv
.
.
.
.
.
.
.
Encryption
.
.
.
.
.
.
.
(AES)
.
.
.
.
.
.
.
2.1
3.2.2
9
up
.
ttac
AES
.
Denitions
.
.
.
ts
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
24
.
Sandwic
.
A
1
k
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Disk
.
.
.
.
.
2.4.3
.
.
25
Key
Pushdo
.
A
hedule
ks
Applic
AES
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
25
.
Pushdo
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2.5
.
.
3.3.2
des
wn-Square-6
5
.
Op
.
.
.
.
.
Encryption
.
.
.
.
.
.
.
.
.
.
.
duction
26
.
Pushdo
.
.
.
.
.
.
.
.
ten
1
1
.
.
.
.
.
ttac
.
.
.
.
.
.
.
.
.
.
.
.
.
26
.
Pushdo
.
artial
.
um
.
-7*
.
.
13
.
3
.
Cryptanalysi
.
s
.
of
.
AES
.
15
.
3.1
.
A
v
ttac
Conof
Mo
.
.
.
the
.
.
.
.
St
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Encryption
.
.
T
ration
.
.
AES
.
.
4.7.2
.
on
.
.
.
.
4.3.2
.
.
.
Mo
AESI2
.
.
.
.
State
.
.
.
.
.
.
.
men
Mo
.
Prop
.
.
.
.
.
.
.
A
.
.
4.7.1
a
.
n
SIM
.
.
.
.
.
erm
.
.
.
.
.
Singl
.
for
.
out
Classication
.
.
AESI1
.
.
.
.
Rectangle
AES2I
.
.
o
.
.
.
osed
(DP
(SSM)
.
.
49
.
.
.
.
.
4.1.1
.
of
.
.
Assumptions
.
.
.
.
.
.
.
of
Blo
.
Sc
.
.
.
3.5
.
.
.
.
.
General
40
.
.
del
.
Side
.
.
AES2I
.
.
34
.
.
tages
Denitions
.
.
.
.
P
.
.
.
.
.
44
erminol
.
.
.
.
45
.
Encryption
.
.
3.7
4.9.1
.
dication
Rijndael
46
.
dication
.
4.9.3
.
.
27
.
.
.
.
y
36
.
.
.
.
y
.
.
.
.
.
y
4.4.1
.
.
.
.
Mo
.
.
.
.
Mo
.
.
Dynamic
.
c
Static
.
Encryption
.
.
.
e
.
.
Recommendations
.
.
4.5.1
.
.
.
.
.
.
.
5
.
5.1
A
.
del
.
.
.
.
.
.
q
.
.
38
.
.
.
.
.
.
.
.
.
Imp
5.2.2
eak
.
Generalized
.
k
Keys
.
.
.
.
.
.
.
4.6.2
Dieren
.
.
.
.
.
.
.
osed
.
33
.
.
.
heme
Static
.
(SIM)
osed
.
31
.
.
.
Sc
.
.
.
A
AESI2
.
.
k
.
.
.
ks
.
T
.
.
dv
logies
DIM
.
.
.
.
.
.
.
.
.
4.8
.
ut
.
del
.
.
.
.
.
.
.
.
4.3.1
Dynamic
.
AES
.
.
.
.
.
.
.
.
.
Securit
Key
Prop
.
dels
.
.
.
.
29
.
.
Guidelines
.
Round
.
.
.
.
.
The
.
Round
.
.
Sc
.
.
acts
.
.
.
.
.
.
.
.
.
.
.
.
.
4.9.4
.
AESS1
.
.
Dynamic
.
Related
.
(DSM)
.
.
4.9.5
.
AESS2
.
.
.
.
.
.
.
.
.
4.9.6
.
AES2S
.
.
.
.
.
.
.
.
4
4.10
.
.
ttac
.
.
.
Encryptio
.
.
.
3.5.2
.
.
.
33
49
.
erm
.
t
37
titution
the
AES)
Mo
.
Sc
.
.
.
dels
.
.
.
.
.
.
.
.
Applications
.
.
for
.
.
.
.
4.11
AESS2
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
w
.
hemes
38
tro
Encryption
.
an
.
.
.
and
.
.
.
.
.
Related-k
.
.
53
.
R
.
r
.
.
.
.
.
.
Dynamic
.
.
.
(DIM)
5.2.1
.
.
.
.
30
.
.
.
33
.
.
.
.
.
w
Requiremen
osed
Sc
able
.
.
.
c
.
Key
5.2.3
Ciphers
n
ossible
.
.
.
hedule
.
.
.
27
55
.
.
.
40
.
DI-AES
.
.
.
.
.
.
.
.
Prop
.
.
.
.
.
.
.
tial
.
.
.
.
.
4.2
.
Enhanced
.
Sc
.
.
4.7
of
Injection
on
del
Prop
.
.
.
Mo
.
Key
.
s
.
3.6
.
.
.
ttac
.
.
.
Channel
.
.
42
hedule
AESI1,
.
and
tt
.
.
.
.
.
.
.
c
.
.
.
.
.
4.3
.
.
.
ermi
42
.
A
o
an
.
of
and
and
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
42
.
Dynamic
.
erm
.
ati
.
Mo
.
(DPM)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
35
.
.
4.8.1
T
P
.
utation
ogies
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4.9
.
y
ttac
the
.
osed
.
Mo
.
.
.
.
.
.
31
.
.
.
.
.
.
46
Summary
The
.
for
3.5.1
e
.
Mo
.
.
35
.
.
.
Denitions
.
.
4.9.2
.
Guidelines
Key
Double
.
Mo
.
.
.
.
.
.
.
47
.
F
.
Ab
hedule
AES
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3.4.2
47
.
Securit
.
of
.
and
.
.
4.4
.
.
.
Substitution
.
.
.
del
.
.
.
.
.
.
48
.
Securit
.
of
.
and
Key
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Sc
48
.
Securit
.
of
37
and
.
.
DS-AES
.
.
.
.
.
A
.
.
.
31
.
.
.
.
48
.
Hybrid
Prop
dels
.
.
.
.
.
.
sed
.
.
.
29
.
.
.
n
.
.
.
k
.
.
.
dels
.
.
.
Prop
.
.
4.10.1
4.1
P
.
utation
.
a
.
i
of
Subs
4.5
AES
Key
SS-
Substitution
.
Art
.
del
.
.
.
.
.
Mo
.
.
.
h
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
dule
4.10.2
.
and
.
.
.
.
.
.
.
.
.
.
37
.
AES
50
AESS1,
Summary
.
.
and
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
50
33
Net
.
ork
3.4.1
Sc
.
53
Classical
In
4.5.2
duction
.
.
dv
.
Mo
.
tages
.
.
.
DSM
.
.
.
SSM
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5.2
.
and
.
e
.
ui
.
e
.
ts
.
.
.
.
.
.
.
.
4.6
.
.
.
Injection
.
ey
.
del
.
.
54
.
Assumptions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3.5.3
.
.
.
4.1.2
.
.
.
.
54
The
A
ks
hedule
.
27
.
.
.
AES2S
.
.
ts
.
the
.
hemes
39
.
4.6.1
.
T
.
ransformation
.
F
.
unctions
.
.
54
.
Secondary
.
Ge
.
e
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
vi
.
3.4.
6.3.2
.
duction
.
Analysis
.
.
the
.
.
.
.
.
.
.
.
hemes
.
.
.
.
.
6.1.1
arameters
.
.
y
.
.
.
.
.
.
6.3.3
.
ork
5.4.2
.
.
.
.
y
.
Ev
.
.
65
.
.
.
.
.
.
.
.
.
90
.
6.2
Mo
es
.
Chaining
.
.
.
.
.
.
.
.
.
.
.
.
.
.
GCM(x)-On
.
.
Net
.
83
.
.
.
CBC
55
.
.
.
.
.
.
.
.
.
.
Summary
.
.
P
87
CBC-On
.
.
.
.
.
.
Sc
ter
.
.
.
.
.
.
eak
.
.
.
.
.
.
.
.
.
.
.
.
.
y
.
.
.
68
.
w
.
.
.
k
Co
P
.
.
.
78
.
.
.
.
.
.
.
.
.
.
.
.
5.10.1
.
.
.
.
.
The
.
.
.
.
.
Analysis
.
.
5.5.4
.
.
5.11.1
.
.
.
.
.
.
.
.
.
.
.
.
Analysis
The
.
.
.
5.11.4
.
.
.
.
.
.
.
.
.
.
Conguration
.
.
.
.
89
.
.
5.7.1
.
.
.
.
.
.
ts
.
.
59
.
.
.
.
.
.
.
.
T
.
.
Sc
.
.
.
.
90
5.8
.
.
.
.
.
k
.
.
.
.
.
.
59
des
7
.
.
.
.
91
hemes
.
.
.
.
.
Results
Cipher
.
.
.
.
.
W
.
.
61
.
Analysis
.
ter
6.2.4
.
.
.
.
.
.
.
93
.
(MCB)
.
.
ulation
.
.
Design
.
.
GCM(x)-Pre
.
of
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
61
Net
5.3.3
Sim
.
.
.
.
.
.
.
81
.
of
.
ork
.
.
.
.
.
.
.
Securit
.
the
.
.
.
.
.
.
.
.
.
.
.
y
.
CTR
.
.
Chaining
.
.
.
.
.
.
5.11.2
.
AES
.
.
.
.
.
.
.
.
5.6
.
.
85
.
y
.
Construction
.
.
5.4.3
.
.
y
CBC-Pre
hemes
.
.
.
.
.
.
.
.
.
86
.
.
.
.
55
.
Serv
.
.
.
Sim
.
.
.
.
.
.
Disk
.
In
.
.
.
.
.
.
er
.
.
.
.
.
.
.
.
.
.
Encryption
.
.
.
.
.
.
5.4
.
.
6.1.2
CTR-S
.
5.7.2
.
.
.
.
.
.
.
.
.
de
89
.
eak
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
T
.
.
y
.
.
.
.
.
.
.
.
.
A
.
dels
.
.
.
.
.
.
.
.
.
.
.
.
.
t
.
Op
Galois/Coun
.
The
.
.
.
Sim
.
(GCM)
.
.
T
.
.
.
.
.
.
.
.
.
.
5.8.2
.
.
91
the
c
.
.
i
.
.
.
.
.
.
6.2.3
.
.
.
.
.
.
5.4.1
.
P
.
GCM
.
.
.
.
.
.
.
Implemen
.
.
.
lo
.
.
.
.
.
.
.
.
.
.
Mask
.
Bo
5.9.1
.
ormat
.
Analysis
.
.
.
.
.
.
94
.
.
61
.
.
.
.
.
The
.
.
.
P
.
.
of
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Mask
.
.
.
.
.
.
.
.
.
.
.
.
.
95
.
.
.
.
.
.
.
.
56
.
.
81
.
The
5.5.3
w
.
Analysis
.
ulation
.
.
.
.
CBC-S
.
.
.
57
.
.
.
.
.
.
5.10.2
CTR-Pre
Results
.
the
.
w
.
Analysis
.
.
.
.
.
.
.
.
.
.
.
.
.
5.11
.
y
.
of
.
Sc
.
.
.
.
.
.
62
.
.
.
GSCM(x)
.
.
.
.
.
.
.
.
85
.
Securit
.
of
.
and
.
.
.
.
.
.
Blo
.
.
.
.
.
.
.
.
.
.
.
.
85
.
Securit
.
of
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5.3.1
.
63
.
.
.
Memory
.
.
.
.
5.11.3
.
Securit
.
of
.
en-Mansour
.
.
58
.
.
.
.
.
.
86
CTR-On
Securit
.
of
.
Sc
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5.12
.
.
.
.
.
.
.
.
.
.
5.7
.
.
.
er
.
.
.
and
.
.
.
ulation
.
5.3.2
.
arameters
.
.
.
.
.
.
6
.
Encryption
.
6.1
.
tro
(CBC)
.
.
.
.
.
65
.
.
.
Serv
.
.
.
Conguration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
89
.
Disk
.
Constrain
.
.
.
.
56
.
.
.
.
.
.
.
.
.
.
.
5.4.4
89
.
General
Coun
heme
65
.
.
.
P
.
.
.
.
.
.
.
.
.
Mo
.
.
.
.
.
.
.
.
.
.
6.1.3
.
w
.
.
(CTR)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
hemes
.
.
.
.
.
.
.
.
.
.
.
.
6.1.4
67
w
.
Calculation
Stabilit
.
.
.
Analysis
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
6.1.5
.
ttac
.
Mo
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
90
.
Curren
.
Mo
5.5
of
6
erations
.
.
5.8.1
.
ter
.
Stabilit
.
.
.
Analysis
.
de
.
ulation
.
.
.
.
.
Sc
6.2.1
.
erminologi
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
67
.
.
.
The
.
.
.
of
6.2.2
.
Blo
Stabilit
k
.
(CBC)
Analys
.
.
.
s
.
.
.
.
.
.
.
.
.
hemes
92
.
LR
.
.
.
.
57
.
.
.
.
.
.
.
.
.
5.9
.
5.5.1
.
erformance
.
Coun
.
.
.
Soft
.
.
.
.
.
.
92
are
XTS
.
.
B
.
.
.
tations
.
.
.
.
.
.
.
.
.
.
.
c
.
.
.
.
.
.
.
.
.
.
.
.
6.3
.
ed
F
de
78
ok
.
.
The
.
.
.
erformance
.
.
.
Sim
.
.
.
.
.
.
.
.
.
.
.
.
6.3.1
.
Goals
.
.
.
.
.
.
5.5.2
.
.
.
.
.
5.9.2
.
.
.
Results
.
.
.
the
.
.
.
erformance
94
k
Keys
.
MCB
.
.
.
.
.
.
.
.
.
.
.
Cipher
c
Sc
.
.
.
.
.
.
.
.
.
.
.
78
.
5.10
.
Net
.
w
.
ork
95
Analysis
The
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
vii
.
5.3.
.
.
.
.
.
.
Design
Outlo
A
.
.
.
.
.
.
.
.
.
.
.
y
Chaining
.
.
.
.
.
.
.
.
.
6.7.1
6.3.7
.
.
.
.
.
102
6.8.2
.
.
actor
.
.
C
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
dv
.
.
.
.
.
.
.
.
.
6.7.2
.
.
.
.
Prop
.
.
.
.
110
.
.
.
.
.
A
.
6.9
.
.
.
.
.
123
.
D
98
de
.
104
.
.
of
.
.
.
.
.
.
.
.
.
.
.
100
Design
.
.
.
.
.
.
6.6.4
.
.
.
.
.
.
.
ESCC
of
.
.
.
.
P
.
.
.
.
.
.
.
.
Diusers
.
.
.
.
.
.
.
.
.
tages
Benc
.
.
.
.
.
6.8
.
.
.
.
.
.
.
SCC-128
.
.
endency
.
.
.
.
.
.
.
.
ables
.
.
6.5.4
.
.
.
.
.
.
.
.
.
.
MBO
.
Sim
.
Sim
.
erformance
.
Figures
.
.
Substitution
.
99
Design
.
.
an
.
de
.
.
.
.
.
.
.
.
6.6.2
.
.
.
.
.
.
.
.
.
.
6.3.6
.
.
.
.
104
Securit
.
.
.
.
Design
.
.
.
Ciphertext
.
.
.
.
10
.
of
Securit
.
.
.
.
.
.
.
.
.
6.5
6.6.5
.
tages
.
.
.
.
.
.
.
.
.
.
.
107
.
Analysis
.
.
.
.
.
.
.
.
.
.
.
.
.
hmark
6.5.1
.
6.4.2
.
.
.
.
.
.
.
.
Utilization
.
.
dv
.
.
.
.
.
.
.
.
108
.
Results
.
.
101
.
MCB
.
Mo
.
.
.
.
of
.
.
.
.
.
.
.
.
.
.
.
.
.
Cryptanalysis
.
.
.
.
Bit
.
.
.
ests
.
.
of
.
.
99
.
.
.
.
.
.
114
.
king
.
ELEPHANT
.
.
.
.
.
.
y
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
.
ns
.
119
.
V
.
P
.
Results
.
w
.
Results
.
Encryption
.
141
.
List
.
List
6.4
160
.
.
.
.
.
.
Cipher
6.6.1
6.4.4
Goals
.
.
dv
.
Mo
.
tages
.
.
.
SCC
.
(SCC)
.
.
.
.
.
.
.
.
.
.
.
.
104
.
Keys
.
.
.
.
.
.
.
.
.
.
.
.
96
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Securit
.
6.4.5
6.6.3
.
.
y
.
.
SCC
.
6.4.1
.
.
.
Against
.
.
.
Goals
.
.
.
6.3.5
.
.
.
.
.
.
.
Collisions
.
.
5
.
Discussion
.
ESCC
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
y
.
100
.
.
106
ELEPHANT
A
.
an
.
of
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
MCB
.
.
6.7
.
erformance
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
107
.
Benc
100
Application
98
.
The
.
97
.
.
.
Keys
.
.
.
.
.
.
.
.
.
.
108
A
CPU
.
.
.
.
.
.
.
.
.
.
.
.
.
.
an
.
.
.
.
.
.
.
.
.
.
6.7.3
.
hmarking
.
.
of
.
.
.
.
.
6.5.2
.
.
.
osed
.
.
.
dication
.
.
.
.
108
.
Cryptanalysis
.
SCC
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
6.8.1
.
of
.
.
.
.
.
.
6.5.3
.
.
.
Dep
.
.
.
T
.
.
.
.
110
.
Cryptanalysis
.
SCC-256
.
.
.
.
.
.
.
.
6.4.3
.
.
.
.
.
.
.
.
.
.
6.8.3
.
ttac
.
ELEPHANT
.
and
.
T
.
.
.
.
.
.
103
117
.
Summary
Safet
.
.
.
F
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
117
.
Conclusio
and
Design
.
.
.
95
y
98
of
.
.
ok
.
A
.
X
.
alues
.
B
.
erformance
.
ulation
.
129
.
Net
.
ork
.
ulation
104
135
6.6
Disk
Extended
P
Substitution
Results
Ci
Bibliograph
ph
147
e
of
r
158
Chaining
of
Mo
viii
(ESCC)
6.3.4
+