Results 1 to 10 of about 153 (84)

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +6 more sources

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +3 more sources

Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC

open access: yesIET Information Security, 2023
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj   +2 more sources

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +2 more sources

Impossible Boomerang Attacks Revisited

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj   +2 more sources

New Properties of the Double Boomerang Connectivity Table

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang   +4 more
doaj   +1 more source

Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC

open access: yesThe Computer Journal, 2021
Abstract Deoxys-BC is an internal tweakable block cipher of the authenticated encryption algorithm Deoxys, which is a third-round finalist in the CAESAR competition. In this paper, we study the property of Deoxys-BC, such as the subtweakey difference cancelation and the freedom of the tweak.
Manman Li, Shaozhen Chen
openaire   +1 more source

A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]

open access: yesJisuanji kexue
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC

open access: yesIET Information Security, 2019
Deoxys‐BC is a tweakable block cipher designed by Jean et al . at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys‐BC is used in the CAESAR finalist Deoxys. In this study, the authors consider the security of Deoxys‐BC against meet‐in‐the‐middle attack in the single‐key setting. Using
Rongjia Li, Chenhui Jin
openaire   +1 more source

Home - About - Disclaimer - Privacy