Results 1 to 10 of about 53,319 (274)
Automatic Search of Cubes for Attacking Stream Ciphers [PDF]
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stream ciphers. As the problem that how to recover the superpolys accurately was resolved by Hao et al. in EUROCRYPT 2020, another important problem is how to
Yao Sun
doaj +6 more sources
Cube attacks on round-reduced TinyJAMBU
Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such ...
Wil Liam Teng +4 more
doaj +3 more sources
Key‐dependent side‐channel cube attack on CRAFT [PDF]
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang +1 more
doaj +2 more sources
Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin +2 more
doaj +2 more sources
Conditional Cube Attack on Round-Reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj +4 more sources
Dynamic Cube Attacks against Grain-128AEAD
In this paper, we revisit the division property based dynamic cube attack on the full Grain-128 presented by Hao et al. at FSE 2020 and demonstrate that their attack on the full Grain-128 is invalid, that is, no key information could be successfully ...
Chen Liu, Tian Tian
doaj +2 more sources
New Conditional Cube Attack on Keccak Keyed Modes
The conditional cube attack on round-reduced Keccak keyed modes was proposed by Huang et al. at EUROCRYPT 2017. In their attack, a conditional cube variable was introduced, whose diffusion was significantly reduced by certain key bit conditions.
Zheng Li +5 more
doaj +4 more sources
Links between Division Property and Other Cube Attack Variants
A theoretically reliable key-recovery attack should evaluate not only the non-randomness for the correct key guess but also the randomness for the wrong ones as well.
Yonglin Hao +5 more
doaj +4 more sources
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers.
Chen-Dong Ye, Tian Tian
doaj +3 more sources
Analysis of the success probability of cube attack
The success probability of cube attack was theoretically discussed when a boolean function was chosen at random and the algebraic degree or the number of terms in its algebraic normal form representation was restricted.The results provided theoretic ...
Hai-xin SONG +3 more
doaj +3 more sources

