Results 11 to 20 of about 6,566 (183)
Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj +4 more sources
Differential-Linear Cryptanalysis of Reduced Round ChaCha
ChaCha is a well-known stream cipher that has been used in many network protocols and software. In this paper, we study the security of reduced round ChaCha. First, by considering the differential-linear hull effect, we improve the correlation of a four-
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
doaj +2 more sources
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential-linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has
Wenya Li, Kai Zhang, Bin Hu
doaj +2 more sources
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve two kinds of problems: calculation of the minimum number of ...
Chunning Zhou +3 more
doaj +3 more sources
Rotational Differential-Linear Cryptanalysis Revisited
AbstractThe differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with ...
Liu, Yunwen +4 more
openaire +2 more sources
A Further Understanding of Differential‐Linear Cryptanalysis [PDF]
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the method. However, the links between differential-linear cryptanalysis and other important cryptanalysis methods have been still missing. The motivation is to fix the gap.
Jiongjiong Ren, Shaozhen Chen
openaire +1 more source
Generalized differential-linear cryptanalysis of block cipher
Диференціально-лінійний метод криптоаналізу блокових шифрів запропоновано в 1994 р. Він виявляється більш ефективним в порівнянні з (окремо) диференціальним та лінійним методами, проте його наукове обґрунтування залишається предметом подальших досліджень. Відомо декілька публікацій, присвячених формалізації диференціально-лінійного методу та з’ясуванню
openaire +4 more sources
Differential-Linear Cryptanalysis [PDF]
This paper introduces a new chosen text attack on iterated cryptosystems, such as the Data Encryption Standard (DES). The attack is very efficient for 8-round DES,2 recovering 10 bits of key with 80% probability of success using only 512 chosen plaintexts. The probability of success increases to 95% using 768 chosen plaintexts.
Susan K. Langford, Martin E. Hellman
openaire +1 more source
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan +3 more
doaj +1 more source
Wave-Shaped Round Functions and Primitive Groups [PDF]
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo +4 more
core +2 more sources

