Results 61 to 70 of about 153 (84)

Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT [PDF]

open access: yes, 2020
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Boxin Zhao   +4 more
core  

Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 [PDF]

open access: yes, 2022
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in keyrecovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to ...
Haoyang Wang, Jian Guo, Ling Song
core  

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond [PDF]

open access: yes
In differential-like attacks, the process typically involves extending a distinguisher forward and backward with probability 1 for some rounds and recovering the key involved in the extended part.
Jian Weng   +4 more
core  

Square Attack on 7-Round Kiasu-BC [PDF]

open access: yes, 2016
Kiasu-BC is a tweakable block cipher presented within the TWEAKEY framework at AsiaCrypt 2014. Kiasu-BC is almost identical to AES-128, the only difference to AES-128 is the tweak addition, where the 64-bit tweak is xored to the first two rows of every ...
Christoph Dobraunig   +2 more
core   +2 more sources

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch [PDF]

open access: yes, 2016
Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption, Deterministic Authenticated Encryption (DAE) is used
Christian Forler   +3 more
core  

Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE [PDF]

open access: yes, 2023
The signed difference is a powerful tool for analyzing the Addition, XOR, Rotation (ARX) cryptographic primitives. Currently, solving the accurate model for the signed difference propagation is infeasible.
Lin Jiao   +3 more
core  

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery [PDF]

open access: yes
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi   +7 more
core  

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications [PDF]

open access: yes, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers asymptotically optimal security in the multi-user setting.
Chun Guo   +4 more
core  

MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC [PDF]

open access: yes, 2019
In this paper, we study the relation of single-key impossible differentials with the related-tweakey/key ones and propose an interesting algorithm that can efficiently derive longer related-tweakey/key impossible differentials from single-key ones.
Rui Zong, Xiaoyang Dong
core  

Home - About - Disclaimer - Privacy