Results 1 to 10 of about 9,083 (227)

Quantum Differential and Linear Cryptanalysis

open access: bronzeIACR Transactions on Symmetric Cryptology, 2016
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities.
Marc Kaplan   +3 more
doaj   +10 more sources

Quantum differential cryptanalysis to the block ciphers [PDF]

open access: yes, 2015
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core   +3 more sources

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher [PDF]

open access: goldIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +2 more sources

Flaws in Differential Cryptanalysis of Skipjack [PDF]

open access: bronze, 2002
This paper is motivated by some results presented by Knudsen, Robshaw and Wagner at Crypto'99, that described many attacks of reduced versions of Skipjack, some of them being erroneous. Differential cryptanalysis is based on distinguishers, any attack should prove that the events that triggers the analysis has not the same probability for the cipher ...
Louis Granboulan
openalex   +2 more sources

Differential Cryptanalysis of Round-Reduced LEA

open access: yesIEEE Access, 2018
In this paper, we focus on the differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Search algorithm to find a differential path in ARX ...
Ashutosh Dhar Dwivedi, Gautam Srivastava
doaj   +4 more sources

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: bronze, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openalex   +3 more sources

On Probability of Success in Linear and Differential Cryptanalysis [PDF]

open access: bronzeJournal of Cryptology, 2007
Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust treatment of their success probability, and the success chances of these attacks have commonly been estimated in a rather ad hoc fashion.
Ali Aydın Selçuk
openalex   +6 more sources

Improved Differential Cryptanalysis of SPEEDY

open access: diamondIACR Transactions on Symmetric Cryptology
SPEEDY is a family of lightweight block ciphers designed by Leander et al. Several differential attacks have been reported on the SPEEDY variants. However, nearly all of these attacks are based on differential characteristics with probabilities that ...
Tim Beyne, Addie Neyt
doaj   +2 more sources

Automated Differential-Linear Cryptanalysis for AND-RX Ciphers [PDF]

open access: goldIET Information Security
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential-linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has
Wenya Li, Kai Zhang, Bin Hu
doaj   +2 more sources

A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis

open access: goldIET Information Security
At CRYPTO 2019, Gohr showed the significant advantages of neural distinguishers over traditional distinguishers in differential cryptanalysis. At fast software encryption (FSE) 2024, Bellini et al.
Gao Wang, Gaoli Wang, Siwei Sun
doaj   +2 more sources

Home - About - Disclaimer - Privacy