Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2010, Vol. 33 ›› Issue (3): 44-47.doi: 10.13190/jbupt.201003.44.chenshw

• Papers • Previous Articles     Next Articles

Analysis on the Consistent Degree of Addition Modulo 2n with XOR and Its Application

CHEN Shi-wei1, JIN Chen-hui2, LI Xi-bin2   

  1. (Institute of Electronic Technology, University of Information Engineering, Zhengzhou 450004, China)

  • Received:2009-06-29 Revised:2010-03-11 Online:2010-06-28 Published:2010-05-14

Abstract:

To analyze the impact on the security of cryptographic algorithm produced by the mixed usage 

of modulo 2n and exclusive OR (XOR), based on the consistent degree of these two operations

 for commutative law, the computation formulas of the probability distribution of the noise function 

and the square sum of the probability values are presented. And a new distinguishing attack on 

Py is proposed, of which the data complexity is about 273.82.

Key words: addition modulo 2n, XOR addition, consistent degree, noise function, distinguishing attack

CLC Number: