Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption [PDF]
In this paper, we investigate the efficiency of FPGA implementations of AES and AES-like ciphers, specially in the context of authenticated encryption. We consider the encryption/decryption and the authentication/verification structures of OCB-like modes
Anupam Chattopadhyay +2 more
core
Integral attacks on reduced-round Deoxys-BC and RAIN algorithms
Considering the impact of tweakeys on tweakable block cipher algorithms, achieved integral attacks on Deoxys-BC and RAIN algorithms by combining zero-correlation linear cryptanalysis with integral attacks and utilizing partial-sum technique. 176 types of
Du Xiaoni +3 more
doaj
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT [PDF]
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Boxin Zhao +4 more
core
Square Attack on 7-Round Kiasu-BC [PDF]
Kiasu-BC is a tweakable block cipher presented within the TWEAKEY framework at AsiaCrypt 2014. Kiasu-BC is almost identical to AES-128, the only difference to AES-128 is the tweak addition, where the 64-bit tweak is xored to the first two rows of every ...
Christoph Dobraunig +2 more
core +2 more sources
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond [PDF]
In differential-like attacks, the process typically involves extending a distinguisher forward and backward with probability 1 for some rounds and recovering the key involved in the extended part.
Jian Weng +4 more
core
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 [PDF]
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in keyrecovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to ...
Haoyang Wang, Jian Guo, Ling Song
core
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch [PDF]
Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption, Deterministic Authenticated Encryption (DAE) is used
Christian Forler +3 more
core
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery [PDF]
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi +7 more
core
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE [PDF]
The signed difference is a powerful tool for analyzing the Addition, XOR, Rotation (ARX) cryptographic primitives. Currently, solving the accurate model for the signed difference propagation is infeasible.
Lin Jiao +3 more
core
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core

